Figure 1


Internet encryption combines symmetric and asymmetric key schemes.

Figure 1