Save Time & improve Grades
- Questions Asked
- Experts
- Total Answered
Start Excelling in your courses, Ask an Expert and get answers for your homework and assignments!!
Public key cryptography 1. Public key cryptography is so-named because: a. It is the world standard for HTTPS b. It works on all popular computer operating systems c. It uses an encryption key that can be released to the public d. The encryption algorithms reside in the public domain 2. A security manager is searching for an encryption algorithm to be used to encrypt data files containing sensitive information. Which of the following algorithms should NOT be considered: a. FISH b. Twofish c. Blowfish d. CAST 3. A particular encryption algorithm transforms plaintext to ciphertext by XORing the plaintext with the encryption key. This is known as: a. Electronic codebook b. Cipher block chaining c. Block cipher d. Stream cipher 4. Two parties that have never communicated before wish to send messages using symmetric encryption key cryptography. How should the parties begin? a. The receiving party should send its public encryption key to the transmitting party. b. Each party should exchange public encryption keys. c. Each party should send the encryption key via the communications channel to the other party. d. One party should transmit the encryption key via an out of band communications channel to the other party. 5. Two parties that have never communicated before wish to send messages using asymmetric key cryptography. How should the parties begin? a. The receiving party should send its private encryption key to the transmitting party. b. The transmitting party should send its private encryption key to the receiving party. c. The receiving party should send its public encryption key to the transmitting party. d. The transmitting party should send its public encryption key to the receiving party Computer Science Assignment Help, Computer Science Homework help, Computer Science Study Help, Computer Science Course Help
Ask a question
Experts are online
Answers (1)
Public key cryptography
Answer Attachments
1 attachments —