COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Nicholas’s public key
|
|
Nicholas’s private key
|
|
Her public key
|
|
Her private key
|
Detailed explanation-1: -Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys–one public key and one private key–to encrypt and decrypt a message and protect it from unauthorized access or use.
Detailed explanation-2: -Substitution ciphers encrypt the plaintext by swapping each letter or symbol in the plaintext by a different symbol as directed by the key.
Detailed explanation-3: -Hashing and encryption both provide ways to keep sensitive data safe. However, in almost all circumstances, passwords should be hashed, NOT encrypted. Hashing is a one-way function (i.e., it is impossible to “decrypt” a hash and obtain the original plaintext value). Hashing is appropriate for password validation.
Detailed explanation-4: -When Patricia receives a message from Gary, she wants to be able to demonstrate to Sue that the message actually came from Gary. What goal of cryptography is Patricia attempting to achieve? Gary is sending a message to Patricia. He wants to ensure that nobody tampers with the message while it is in transit.