Question

Hello, the answers I have are wrong. CAn you explain me which one is correct and why?

Question 5 10 points 2 The single-key algorithms are hard to use over the Internet because you cant share the secret key with everyone you want to commmunicate with, neither can you store a large number of keys to communicate with everyone. Two-key algorithms require long public key and complex factorization that slows down communications. The solution is the hybrid encnryption methods in which a third method is used that uses neither the single-key not the two-key encryption, but something in between single-key algorithm is used for encryption and two-key algorithms are used for decryption. (e) a person sends the secret key to another person using the two key algorithm and then uses this secret key for communvstions O two people or machines or applications exchange information to generate the same single key on both sides and use single-key algorithm to communicate

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Question 5:
Ans: A person sends the secret key to another person using the two-key algorithm and then uses this secret key for communication
Explanation:
Hybrid encryption method is nothing but the combination of asymmetric and symmetric encryption to benefit more security. In this encryption Public key encryption is used for symmetric key encryption. Reciever uses the public key encryption method to decrypt the symmetric key. Once the symmetric key is decrypted, by using that symmetric key we can decrypt original message. So that this encryption method is considered a most secure encryption.


Question 21:
Ans: access control list bases access control
Explanation:
An access control list (ACL) is nothing but a list of access control entries (ACE). Each entry in an ACL usually identifies a trustee and their access rights which are allowed, denied, or audited.


Question 27:
Ans: of variable length, while the input should be constant

Add a comment
Know the answer?
Add Answer to:
Hello, the answers I have are wrong. CAn you explain me which one is correct and...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • QUESTION 2 Ensuring that data is genuine, meaning that the sender of the data is who...

    QUESTION 2 Ensuring that data is genuine, meaning that the sender of the data is who they say they are, that the data received is the data that the sender meant to send, and that the receiver is who they say they are a. confidentiality b. authentication c. non-repudiation d. integrity 2 points    QUESTION 3 Cryptography method that uses a single key for both encryption and decryption a. prime factorization b. asymmetric c. symmetric d. message authentication code 2...

  • 1. Something you know (SYK) Something you have (SYH) Something you are (SYA) Something you do...

    1. Something you know (SYK) Something you have (SYH) Something you are (SYA) Something you do (SYD) are attributes that allow you to do what to a user? ___________ 2. Consider the primitive case of asymmetric encryption; no digital signature and no digital envelope. A person sends a message to a recipient using asymmetric encryption. What is the total number of keys used to send and receive the single message? _________________ 3. If the sender of a message encrypts the...

  • You are managing a large scale construction project with hundreds of subprojects, some which have to...

    You are managing a large scale construction project with hundreds of subprojects, some which have to be completed before others can begin whereas some subprojects can be carried out simultaneously. The project and its subprojects, and the presence of dependencies between subprojects (which subprojects have to be done before which), can be modeled as a connected unweighted directed graph with nodes representing subprojects and directed edges representing dependencies. 42. Which of the following algorithms will allow you to determine if...

  • Write code for RSA encryption package rsa; import java.util.ArrayList; import java.util.Random; import java.util.Scanner; public class RSA...

    Write code for RSA encryption package rsa; import java.util.ArrayList; import java.util.Random; import java.util.Scanner; public class RSA {    private BigInteger phi; private BigInteger e; private BigInteger d; private BigInteger num; public static void main(String[] args) {    Scanner keyboard = new Scanner(System.in); System.out.println("Enter the message you would like to encode, using any ASCII characters: "); String input = keyboard.nextLine(); int[] ASCIIvalues = new int[input.length()]; for (int i = 0; i < input.length(); i++) { ASCIIvalues[i] = input.charAt(i); } String ASCIInumbers...

  • The red arrows indicate that the answers were wrong. Can you show me how to do...

    The red arrows indicate that the answers were wrong. Can you show me how to do the work to find the correct answers? Please be detailed. all of the answers shown are correct. the reason im posting this question is because i want someone to show me how to get the answers. specifically the red areas. i need help figuring out the red areas even though the numbers are correct i want to see how you solve this question. nothing...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT