COMPUTER SOFTWARE
OPERATING SYSTEMS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Symmetric (Private Key)
|
|
WEP
|
|
Asymmetric (Shared Key)
|
|
HTTPS
|
Detailed explanation-1: -Symmetric encryption uses a shared private key while asymmetric encryption uses a public/private key pair.
Detailed explanation-2: -Public key cryptography involves a pair of keys known as a public key and a private key (a public key pair), which are associated with an entity that needs to authenticate its identity electronically or to sign or encrypt data. Each public key is published and the corresponding private key is kept secret.
Detailed explanation-3: -Public keys are created using an asymmetric algorithm, which pairs the public key with an associated private key. The most common algorithms used to generate public keys are Rivest-Shamir-Adleman, elliptic curve cryptography and Digital Signature Algorithm.
Detailed explanation-4: -Symmetric key cryptography relies on a shared key between two parties. Asymmetric key cryptography uses a public-private key pair where one key is used to encrypt and the other to decrypt. Symmetric cryptography is more efficient and therefore more suitable for encrypting/decrypting large volumes of data.