COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK TOPOLOGIES AND PROTOCOLS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
True
|
|
False
|
|
Either A or B
|
|
None of the above
|
Detailed explanation-1: -Encryption protocols use a key to alter data so that it’s scrambled, and so that anyone without the key can’t decode the information.
Detailed explanation-2: -The main components of an encryption system are: (1) plaintext (not encrypted message), (2) encryption algorithm (works like a locking mechanism to a safe), (3) key (works like the safe’s combination), and (4) ciphertext (produced from plaintext message by encryption key).
Detailed explanation-3: -Symmetric key encryption algorithms use a single symmetric key for both encryption and decryption, whereas asymmetric key encryption algorithms (aka public key algorithms) use two different but related keys for encryption and decryption.
Detailed explanation-4: -There are three variants with key sizes of 128, 192, and 256 bits. Larger key sizes increase the security of the algorithm but require more processing: 128-bit keys use 10 rounds, 192-bit keys use 12 rounds, and 256-bit keys use 14 rounds.