COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Symmetric Encryption
|
|
Public Key encryption
|
|
Vingenere Cipher
|
|
Firewall software
|
Detailed explanation-1: -Alice has both a public key and a private key, so she keeps her private key in a safe place and sends her public key to Bob. Bob encrypts the secret message to Alice using Alice’s public key. Alice can later decrypt the message with her private key.
Detailed explanation-2: -Alice can use her own Private Key to encrypt the message. Which makes it so the only key in the world that can decrypt her message is her Public key-which she knows Bob (and anyone else) has access to. The message is sent to Bob, who then uses Alice’s Public Key to decrypt the message.
Detailed explanation-3: -Alice sends Bob a message and Encrypts it with the Public Key, that is known the world. Bob receives the message and decrypts it with his Private Key which is only known by him. This is the process of asymmetric encryption.
Detailed explanation-4: -Both Alice and Bob begin by generating a set of public and private keys. They then swap public keys with each other (Alice sends her public key to Bob and vice versa). Now Bob encrypts the sensitive document using Alice’s public key and sends it to her.