COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Shift
|
|
RSA
|
|
Vigenere
|
|
Caesar
|
|
Buknoy
|
Detailed explanation-1: -In an asymmetric cipher, there are two distinct keys: the public key and the private key. The public key is used for encryption, and the private key for decryption.
Detailed explanation-2: -RSA is a type of asymmetric encryption, which uses two different but linked keys. In RSA cryptography, both the public and the private keys can encrypt a message. The opposite key from the one used to encrypt a message is used to decrypt it.
Detailed explanation-3: -Substitution ciphers. Replace bits, characters, or character blocks in plaintext with alternate bits, characters or character blocks to produce ciphertext. A substitution cipher may be monoalphabetic or polyalphabetic: A single alphabet is used to encrypt the entire plaintext message.
Detailed explanation-4: -RSA allows you to secure messages before you send them. And the technique also lets you certify your notes, so recipients know they haven’t been adjusted or altered while in transit. The RSA algorithm is one of the most widely used encryption tools in use today.