COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Authentication
|
|
Non-repudiation
|
|
Integrity
|
|
Confidentiality
|
Detailed explanation-1: -Authentication : The sender and receiver can confirm each other’s identity and the origin/destination of the information.
Detailed explanation-2: -Symmetric encryption is a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic data. The entities communicating via symmetric encryption must exchange the key so that it can be used in the decryption process.
Detailed explanation-3: -Authentication. Authentication is the process of verifying the identity of a data sender or recipient. This allows the message recipient to know that the message was actually sent from the sender and not from someone posing as the sender.
Detailed explanation-4: -Secret key cryptography (symmetrical encryption): Both the sender and receiver must use the same key to encrypt and decrypt messages being sent.
Detailed explanation-5: -Hash functions. Symmetric-key algorithms. Asymmetric-key algorithms. Hash Functions. Symmetric-Key Algorithms for Encryption and Decryption. More items •27-Dec-2019