COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
An asymmetric-key (or public-key) cipher uses
A
1 Key
B
2 Key
C
3 Key
D
4 Key
Explanation: 

Detailed explanation-1: -Asymmetric keys are the foundation of Public Key Infrastructure (PKI) a cryptographic scheme requiring two different keys, one to lock or encrypt the plaintext, and one to unlock or decrypt the cyphertext. Neither key will do both functions. One key is published (public key) and the other is kept private (private key).

Detailed explanation-2: -More important, public-key cryptography is asymmetric, involving the use of two separate keys, in contrast to symmetric encryption, which uses only one key. The use of two keys has deep consequences in the areas of confidentiality, key distribution, and authentication.

Detailed explanation-3: -The two main uses of asymmetric-key algorithms are public-key encryption and digital signatures. Public-key encryption is a method where anyone can send an encrypted message within a trusted network of users.

Detailed explanation-4: -Asymmetric encryption uses the notion of a key pair: a different key is used for the encryption and decryption process. One of the keys is typically known as the private key and the other is known as the public key.

There is 1 question to complete.