COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK TOPOLOGIES AND PROTOCOLS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Encryption requires a key? (1-4)
A
True
B
False
C
Either A or B
D
None of the above
Explanation: 

Detailed explanation-1: -Encryption protocols use a key to alter data so that it’s scrambled, and so that anyone without the key can’t decode the information.

Detailed explanation-2: -The main components of an encryption system are: (1) plaintext (not encrypted message), (2) encryption algorithm (works like a locking mechanism to a safe), (3) key (works like the safe’s combination), and (4) ciphertext (produced from plaintext message by encryption key).

Detailed explanation-3: -Symmetric key encryption algorithms use a single symmetric key for both encryption and decryption, whereas asymmetric key encryption algorithms (aka public key algorithms) use two different but related keys for encryption and decryption.

Detailed explanation-4: -There are three variants with key sizes of 128, 192, and 256 bits. Larger key sizes increase the security of the algorithm but require more processing: 128-bit keys use 10 rounds, 192-bit keys use 12 rounds, and 256-bit keys use 14 rounds.

There is 1 question to complete.