COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Pseudo-random data used in combination with a secret key in WEP and SSL encryption schemes is known as:
A
Salt
B
Shim
C
IV
D
Seed
Explanation: 

Detailed explanation-1: -Definition(s): A binary vector used as the input to initialize the algorithm for the encryption of a plaintext block sequence to increase security by introducing additional cryptographic variance and to synchronize cryptographic equipment.

Detailed explanation-2: -Pseudo-random data added to a password before hashing is called: Shim.

Detailed explanation-3: -In symmetric encryption the same key is used for encryption and decryption. It is therefore critical that a secure method is considered to transfer the key between sender and recipient.

Detailed explanation-4: -Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys–one public key and one private key–to encrypt and decrypt a message and protect it from unauthorized access or use.

There is 1 question to complete.