MULTIMEDIA AND QUALITY OF SERVICE
COMPRESSION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Encryption ____ choose 3 possible answers
|
Uses at least one key to cipher data
|
|
Is only used on text
|
|
Can be symmetric or asymmetric
|
|
Is impossible to break
|
|
Has developed a lot as processing power has increased
|
Explanation:
Detailed explanation-1: -Most internet security (IS) professionals break down encryption into three distinct methods: symmetric, asymmetric, and hashing.
Detailed explanation-2: -The Triple DES encryption process Triple DES operates in three steps: Encrypt-Decrypt-Encrypt (EDE). It works by taking three 56-bit keys (K1, K2 and K3) known as a key bundle and encrypting first with K1, decrypting next with K2 and encrypting a last time with K3.
There is 1 question to complete.