COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Asymmetric encryption
|
|
Low processing power requirements
|
|
Suitable for small wireless devices
|
|
High processing power requirements
|
|
Symmetric encryption
|
Detailed explanation-1: -ECC features smaller ciphertexts, keys, and signatures, and faster generation of keys and signatures. Its decryption and encryption speeds are moderately fast. ECC enables lower latency than inverse throughout by computing signatures in two stages.
Detailed explanation-2: -The foremost benefit of ECC is that it’s simply stronger than RSA for key sizes in use today. The typical ECC key size of 256 bits is equivalent to a 3072-bit RSA key and 10, 000 times stronger than a 2048-bit RSA key! To stay ahead of an attacker’s computing power, RSA keys must get longer.
Detailed explanation-3: -A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session between a user and another computer or between two computers. Session keys are sometimes called symmetric keys because the same key is used for both encryption and decryption.
Detailed explanation-4: -Very fast key generation. Smaller keys, cipher-texts, and signatures. Fast signatures. Signatures can be computed in two stages, allowing latency much lower. Moderately fast encryption and decryption. Than inverse throughput. Right protocols for authenticated key exchange (FH-ECMQV et al.). More items •03-Sept-2018