Give brief definitions of each of the following terms.

a. public-key system
b. public key


a. In public-key systems the enciphering and deciphering functions are separated;
the enciphering key cannot be used to decipher a message. The two keys are
related, but it is not computationally feasible to derive one from the other
within a reasonable period of time. So the encryption key may be made public;
anyone can use it to send a message to the intended receiver, and only the
receiver will be able to decrypt the message.
b. As in the above, a key that may be made public to allow anyone to send a message
to a single receiver who possesses the private decryption key.

Computer Science & Information Technology

You might also like to view...

The most popular computer magazines include all of the following, EXCEPT _____.

A. PC World B. Computers C. Computer Power User D. Wired

Computer Science & Information Technology

A(n)_____ is a detailed description of all data used in a database.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ________ object is inserted into a document but is not connected to the file in which it was created

Fill in the blank(s) with correct word

Computer Science & Information Technology

Professional self-disclosure can be described as:

A. Cultural ways of relating to a person B. An effort on the part of the worker to reveal a commonality between the worker and the client C. The problem is viewed as an unsatisfied want or an unfulfilled need which is away of interpreting the problem in a positive light. D. Environmental stressors which evoke a response from the person

Computer Science & Information Technology