Data can be encrypted using asymmetric encryption.
Use the terms from the list. Some of the terms in the list will not be used. You may use a term more than once.
algorithm binary cipher text compression error hardware
hexadecimal meaningless plain text private public
readable transmission unreadable
Data is encrypted using an encryption key. This is a type of _______ that scrambles the _______ and turns it into _______. This makes the data _______.
A _______ key is used to encrypt the data. This key cannot be used to decrypt the data. A _______ key is used to decrypt the data. Any device is able to request the _______ key, but only your device knows the_______ key.