Asymmetric cryptographic algorithms (also known as public-key cryptography) require two keys:
1. Public key: Used to encrypt the data.
2. Private key: Used to decrypt the data.
Asymmetric Key Cryptography
Asymmetric cryptography uses pairs of keys – a private one kept secret and a public one shared openly. You can use someone’s public key to encrypt a message, and only they can decrypt it with their private key.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Morax1100
4 months, 1 week agoac873d6
7 months, 1 week ago