COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
value22
|
|
value * 22
|
|
value / 22
|
|
value % 22
|
Detailed explanation-1: -Hashing and encryption both provide ways to keep sensitive data safe. However, in almost all circumstances, passwords should be hashed, NOT encrypted. Hashing is a one-way function (i.e., it is impossible to “decrypt” a hash and obtain the original plaintext value). Hashing is appropriate for password validation.
Detailed explanation-2: -Rail fence ciphers are examples of transposition ciphers: The characters in the plaintext message are permuted to create the ciphertext.
Detailed explanation-3: -Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys–one public key and one private key–to encrypt and decrypt a message and protect it from unauthorized access or use.
Detailed explanation-4: -Which of the following is not a reason to revoke an SSL certificate? The validity period has ended.