How is the confidentiality of a message kept using secret key cryptography?
What will be an ideal response?
Assume that a secret key is created and shared between Alice and Bob. In addition, Alice and Bob both agree on using the same cryptographic algorithm, or simply a cipher, to exchange messages. When Alice wants to send a message to Bob, she encrypts the original message, known as plaintext, using the shared secret key, to create ciphertext. The ciphertext is sent to Bob. When Bob receives the ciphertext from Alice, he decrypts it with his copy of the shared secret key to re-create the original plaintext message. Anyone eavesdropping on the communication can get only the encrypted ciphertext and will not be able to see the original message. Thus, the message is sent confidentially.
You might also like to view...
A ____ is a portion of the image that is superimposed or separated from other parts of the document.
a. border b. control c. layer d. banner
What is true about a function call statement?
A. Every function must be called at least once. B. A function may be called whenever it is needed. C. A function may be called only one time in a program. D. A function may not be called from separate functions.
You can apply styles and effects to a video
Indicate whether the statement is true or false
New employees should receive a copy of the company's __________ policies
a. Business continuation b. Disaster recovery c. Security/acceptable use d. None of the above