Compare symmetric and asymmetric encryption schemes, and discuss the circumstances under which a distributed system would use one or the other.
Compare symmetric and asymmetric encryption schemes, and discuss the circumstances under which a distributed system would use one or the other.