Discuss the private key encryption technique and its shortcomings.

What will be an ideal response?


To encode a message, the sender provides the encryption algorithm with the key, which produces the ciphertext message. This is transmitted to the receiver's location, where it is decoded using the same key to produce a cleartext message. Because the same key is used for coding and decoding, control over the key becomes an important security issue. The more individuals that need to exchange encrypted data, the greater the chance that the key will become known to an intruder who could intercept a message and read it, change it, delay it, or destroy it.

PTS: 1

Computer Science & Information Technology

You might also like to view...

Write a single statement that prints a number at random from each of the following sets:

a) 2, 4, 6, 8, 10. b) 3, 5, 7, 9, 11. c) 6, 10, 14, 18, 22.

Computer Science & Information Technology

A hyperlink in a worksheet may take you to which of the following locations:

A) another location in the worksheet or the company intranet. B) a page break. C) home. D) cell.

Computer Science & Information Technology

Intellectual property is a unique product of the human intellect that

a. has commercial value. b. can be reproduced digitally. c. has been produced on paper. d. can be performed in public. e. cannot be understood by anyone other than the creator.

Computer Science & Information Technology

A placeholder in a printf() message always begins with the ____ symbol.

A. + B. & C. % D. *

Computer Science & Information Technology