COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
hash
|
|
one-time pad
|
|
symmetric
|
|
asymmetric
|
Detailed explanation-1: -In this type of cryptography both the parties (sender and receiver) use same key to encrypt and decrypt the message. A popular symmetric key algorithm is Data Encryption Standard (DES), there are also its modern variants such as Triple DES.
Detailed explanation-2: -Symmetric encryption (or pre-shared key encryption) uses a single key to both encrypt and decrypt data. Both the sender and the receiver need the same key to communicate.
Detailed explanation-3: -Asymmetric Encryption, also known as public-key cryptography, uses two separate keys for encryption process. One key is a public key and the other is a private key which are linked and used for encryption and decryption.
Detailed explanation-4: -Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys–one public key and one private key–to encrypt and decrypt a message and protect it from unauthorized access or use.