COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which is the principle of the encryption using a key?
A
1.The key indicates which funcion is used for encryption. Thereby it is more difficult to decrypt a intercepted message as the function is unknown.
B
2.The key contains the secret function for encryption including parameters. Only a password can activate the key.
C
3.All functions are public, only the key is secret. It contains the parameters used for the encryption resp. decryption.
D
4.The key prevents the user of having to reinstall the software at each change in technology or in the functions for encryption.
Explanation: 

Detailed explanation-1: -Any data that is encrypted by a public key can be decrypted only by using the private key of the pair. It is also possible for the owner to use a private key to encrypt sensitive information. If the data is encrypted by using the private key, then the public key in the pair of keys is needed to decrypt the data.

Detailed explanation-2: -Explanation: Private key algorithm is used for encryption of messages and public key algorithm is used for encryption of session keys.

Detailed explanation-3: -Public key encryption is also referred to as asymmetric encryption because there is not just one key used in both directions as with the symmetric encryption. In public key encryption there are two keys; whichever one is used to encrypt requires the other be used to decrypt.

Detailed explanation-4: -Public key encryption includes the following elements: Plaintext: Data that can be read and understood and is used as input for an encryption process. Ciphertext: The output of encryption in a format that is incomprehensible. Private key: A secret code typically used to decrypt encrypted messages.

There is 1 question to complete.