When there is no shared secret and large quantities of sensitive information must be passed, it is more efficient to use a hybrid encryption technique to transfer information. What does this mean?
A. Use of the recipient's public key for encryption and decryption based on the
recipient's private key
B. Use of public key encryption to secure a secret key, and message encryption
using the secret key
C. Use of software encryption assisted by a hardware encryption accelerator
D. Use of elliptic curve encryption
B. Use of public key encryption to secure a secret key, and message encryption
using the secret key
You might also like to view...
To access the element in row r and column c, C++ uses the formula (COLS and ROWS are constant integers):
a) ROWS * c + r b) COLS * c + r c) ROWS * r + c d) COLS * r + c
A text box can have ____, which allow you to view any information not currently showing in the control.
A. scroll bars B. view bars C. scroll handles D. highlight bars
What will be the value of i after the C statements at the right have been executed?
a. 5 i = 3; b. 6 j = 10; c. 8 if ((3 * i) < j) d. 10 i = i + 2; e. 15 i = i + 3;
One factor that determines the readability of a document is the number of ________ per word
Fill in the blank(s) with correct word