COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
RC4
|
|
Bcrypt
|
|
Diffie-Hellman
|
|
RIPEMD
|
Detailed explanation-1: -The RSA algorithm–the most widely used asymmetric algorithm–is embedded in the SSL/TLS, which is used to provide secure communications over a computer network.
Detailed explanation-2: -RSA (Rivest Shamir Adleman)-RSA is considered one of the most secure (and commonly used) asymmetric key encryption algorithms. It’s virtually uncrackable using modern computers.
Detailed explanation-3: -Asymmetric and symmetric encryption are typically used together: use an asymmetric algorithm such as RSA to securely send someone an AES (symmetric) key. The symmetric key is called the session key; a new session key may be retransmitted periodically via RSA. This approach leverages the strengths of both cryptosystems.
Detailed explanation-4: -Diffie–Hellman Key Exchange Protocol It is an asymmetric cipher used by several protocols including SSL, SSH, and IPSec. It allows two communicating parties to agree upon a shared secret, which can then be used to secure a communication channel.