Describe how public-key cryptography works today.

What will be an ideal response?


With public-key cryptography, two keys - called a key pair - are generated at the same time and are designed to work together. Public-key cryptography today works by encrypting a symmetric key with a public key and then decrypting the symmetric key with a private key. The connection, once made, exchanges encrypted data using symmetric encryption.
 

Computer Science & Information Technology

You might also like to view...

Polymorphism allows for specifics to be dealt with during:

a) execution b) compilation c) programming d) debugging

Computer Science & Information Technology

Which file property setting will prevent accidental changes to the original file?

A) compress B) archive C) read-only D) encrypt

Computer Science & Information Technology

All remote storage is considered to be cloud storage.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The illustration shown in the accompanying figure was created in Flash.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology