Define the following as they pertain to encryption: plaintext, ciphertext, encryption algorithm, encryption key. Differentiate between private and public key encryption.
What will be an ideal response?
In the encryption process, the unencrypted, readable data is calledplaintext. The encrypted (scrambled) data is calledciphertext.?Anencryption algorithm, orcypher, is a set of steps that can convert readable plaintext into unreadable ciphertext. A simple encryption algorithm might switch the order of characters or replace characters with other characters. Encryption programs typically use more than one encryption algorithm, along with an encryption key.?Anencryption keyis a set of characters that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext.?Two basic types of encryption are private key and public key. Withprivate key encryption, also calledsymmetric key encryption, both the originator and the recipient use the same secret key to encrypt and decrypt the data.Public key encryption, also calledasymmetric key encryption, uses two encryption keys: a public key and a private key. Public key encryption software generates both the private key and the public key. A message encrypted with a public key can be decrypted only with the corresponding private key, and vice versa. The public key is made known to message originators and recipients. For example, public keys may be posted on a secure webpage or a public-key server, or they may be emailed. The private key, by contrast, should be kept confidential.
You might also like to view...
Given that k is an integer array starting at location 2000, kPtr is a pointer to k and each integer is stored in 4 bytes of memory, what location does kPtr + 3 point
a. 2003 b. 2006 c. 2012 d. 2024
____ notes are information you add about slide content to help you remember to bring up specific points during the presentation.
A. Speaker B. Audience C. Reminder D. Handout
COGNITIVE ASSESSMENT You are purchasing a new mobile phone, and are learning about categories of cellular transmissions. You ask the sales person what the ‘G' stands for in the categories 1G, 2G, 3G, and 4G. What does he reply?
A. gigabytes B. generation C. global D. geographic
A requirement that all employees take time off from work, which allows the organization to audit the individual's areas of responsibility, is known as __________ vacation policy.
Fill in the blank(s) with the appropriate word(s).