COMPUTER NETWORKING

WIRELESS NETWORKS AND MOBILE IP

WIRELESS NETWORKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Encryption requires a key?
A
True
B
False
C
Either A or B
D
None of the above
Explanation: 

Detailed explanation-1: -One key is used to encrypt the information and the other is used to decrypt the information. Sometimes this is referred to as asymmetric encryption because two keys are required to make the system and/or process work securely.

Detailed explanation-2: -Encryption is the method by which information is converted into secret code that hides the information’s true meaning. The science of encrypting and decrypting information is called cryptography. In computing, unencrypted data is also known as plaintext, and encrypted data is called ciphertext.

Detailed explanation-3: -The private key is used to decrypt, as well as to encrypt, so using it for symmetric encryption requires a key exchange to share that key securely with trusted parties authorized to exchange secured data. Cryptographic software is usually used to automate this process.

There is 1 question to complete.