COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
During asymmetric encryption, if Allie sends a message to Nicholas, she will use:
A
Nicholas’s public key
B
Nicholas’s private key
C
Her public key
D
Her private key
Explanation: 

Detailed explanation-1: -Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys–one public key and one private key–to encrypt and decrypt a message and protect it from unauthorized access or use.

Detailed explanation-2: -Substitution ciphers encrypt the plaintext by swapping each letter or symbol in the plaintext by a different symbol as directed by the key.

Detailed explanation-3: -Hashing and encryption both provide ways to keep sensitive data safe. However, in almost all circumstances, passwords should be hashed, NOT encrypted. Hashing is a one-way function (i.e., it is impossible to “decrypt” a hash and obtain the original plaintext value). Hashing is appropriate for password validation.

Detailed explanation-4: -When Patricia receives a message from Gary, she wants to be able to demonstrate to Sue that the message actually came from Gary. What goal of cryptography is Patricia attempting to achieve? Gary is sending a message to Patricia. He wants to ensure that nobody tampers with the message while it is in transit.

There is 1 question to complete.