COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Which of the following illustrate the security through obscurity concept?Choose all that apply.
|
Code obfuscation
|
|
Steganography
|
|
SSID broadcast suppression
|
|
Encryption
|
|
Substitution ciphers
|
Explanation:
Detailed explanation-1: -In symmetric encryption the same key is used for encryption and decryption. It is therefore critical that a secure method is considered to transfer the key between sender and recipient.
Detailed explanation-2: -If we need to randomize an encryption scheme, we commonly use an initialization vector or an IV. This is a type of nonce that provides randomization for this encryption process.
Detailed explanation-3: -Which of the answers listed below refers to a solution designed to strengthen the security of session keys? In cryptography, the term “Key stretching” refers to a mechanism for extending the length of a cryptographic key to make it more secure against brute-force attacks.
There is 1 question to complete.