Briefly explain encryption at the network level.
What will be an ideal response?
Encryption at the network level often consists of using security algorithms to scramble and descramble data. Algorithms used include symmetric-key encryption and asymmetric-key encryption.
• Symmetric key-Symmetric key encryption is a single-key encryption method. A message is encrypted and decrypted through the use of the same key. The drawback of this method is that, if a malicious user learns the key, all encrypted messages become compromised.
• Asymmetric key-Asymmetric, or public key encryption, is more secure than symmetric key encryption, however it is slower. Public key encryption uses a mathematically matched key pair. Each user in this instance would have a public and a private key. The private key remains private to the individual user, whereas the public key can be shared. Data encrypted with the private or public key must be decrypted with the opposite key.
You might also like to view...
A ___________ is an algorithm for which it is computationally infeasible to find either (a) a data object that maps to a pre-specified hash result or (b) two data objects that map to the same hash result.
A. cryptographic hash function B. strong collision resistance C. one-way hash function D. compression function
Most errors involving selection statements and loops are syntax errors.
Answer the following statement true (T) or false (F)
The labeling of the vertices of a graph depends on a specific application.
Answer the following statement true (T) or false (F)
_______________ installation is the best installation method for a large organization with hundreds of computers that require new software at the same time.
Fill in the blank(s) with the appropriate word(s).