When there is no shared secret and large quantities of sensitive information must be passed, it is more efficient to use a hybrid encryption technique to transfer information. What does this mean?

A. Use of the recipient's public key for encryption and decryption based on the
recipient's private key
B. Use of public key encryption to secure a secret key, and message encryption
using the secret key
C. Use of software encryption assisted by a hardware encryption accelerator
D. Use of elliptic curve encryption


B. Use of public key encryption to secure a secret key, and message encryption
using the secret key

Computer Science & Information Technology

You might also like to view...

To access the element in row r and column c, C++ uses the formula (COLS and ROWS are constant integers):

a) ROWS * c + r b) COLS * c + r c) ROWS * r + c d) COLS * r + c

Computer Science & Information Technology

A text box can have ____, which allow you to view any information not currently showing in the control.

A. scroll bars B. view bars C. scroll handles D. highlight bars

Computer Science & Information Technology

What will be the value of i after the C statements at the right have been executed?

a. 5 i = 3; b. 6 j = 10; c. 8 if ((3 * i) < j) d. 10 i = i + 2; e. 15 i = i + 3;

Computer Science & Information Technology

One factor that determines the readability of a document is the number of ________ per word

Fill in the blank(s) with correct word

Computer Science & Information Technology