T/F: Asymmetric cryptosystems make use of both private and public keys. Network Security T/F: Asymmetric cryptosystems make use of both private and public keys. True Learn More : Share this Share on FacebookTweet on TwitterPlus on Google+