COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Diffie-Hellman
|
|
hashing
|
|
RSA
|
|
DES
|
|
WEP
|
Detailed explanation-1: -1. Which asymmetric algorithm provides an electronic key exchange method to share the secret key? Explanation: Diffie-Hellman provides an electronic exchange method to share a secret key and is used by multiple secure protocols.
Detailed explanation-2: -Asymmetric cryptography is often used to exchange the secret key to prepare for using symmetric cryptography to encrypt data. In the case of a key exchange, one party creates the secret key and encrypts it with the public key of the recipient.
Detailed explanation-3: -The Diffie–Hellman (DH) Algorithm is a key-exchange protocol that enables two parties communicating over public channel to establish a mutual secret without it being transmitted over the Internet. DH enables the two to use a public key to encrypt and decrypt their conversation or data using symmetric cryptography.
Detailed explanation-4: -Diffie Hellman uses a private-public key pair to establish a shared secret, typically a symmetric key. DH is not a symmetric algorithm – it is an asymmetric algorithm used to establish a shared secret for a symmetric key algorithm.