What are the main problems with private key cryptography?

What will be an ideal response?


Although enabling encryption in this way may be considered a simple solution, in reality it provides a weak degree of protection.This is primarily because of the problems associated with managing the keys. If the salesperson must download an encrypted file, then there must be a means for her to get the key to decrypt it. Sending the key in a separate e-mail message retrieved through the open hotspot would defeat the entire process. Even if she were to use her cell phone to call the office for the key, someone might hear the conversation or watch as she writes it down.Encrypting single documents using private key cryptography is a weak means of protection.

Computer Science & Information Technology

You might also like to view...

On Facebook, you can find photos where a given person appears by searching for that person's tag

Indicate whether the statement is true or false

Computer Science & Information Technology

As each new bulleted item is added, the entry is automatically ________ 1/4 inch

Fill in the blank(s) with correct word

Computer Science & Information Technology

When you click the Form tool, the results will be an instant form in a simple ______________ layout with all the fields displayed in a single column.

a. top-to-bottom b. descending order c. alphabetical order d. right-to-left

Computer Science & Information Technology

______ is currently the most popular network standard for LANs.

A. Ethernet B. Token ring C. TCP/IP D. LTE

Computer Science & Information Technology