COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
key
A
algorithm for transforming plaintext to ciphertext
B
info used in cipher known only to sender/receiver
C
*recovering ciphertext from plaintext
D
*converting plaintext to ciphertext
Explanation: 

Detailed explanation-1: -In secret key cryptography, both the sender and receiver must use the same key to encrypt and decrypt a message as shown in Fig. 1.8 (for obvious reasons it was named symmetrical encryption).

Detailed explanation-2: -Symmetric-symmetric encryption or secret key encryption is one key crypto. You use one key to encrypt the information and the same key to decrypt the information. The benefits is that it is very fast but since both parties use the same key, there needs to be a secure channel for key exchange.

Detailed explanation-3: -The sender uses a public key to encrypt the message. The recipient uses its private key to decrypt the message. Asymmetric encryption is also called public-key encryption, but it actually relies on a key pair.

Detailed explanation-4: -Symmetric encryption techniques rely on both the sender and receiver using the same key to encrypt and decrypt the data.

There is 1 question to complete.