1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksandrvk [35]
3 years ago
9

Public-key cryptography can be used for encryption (ElGamal for instance) and key exchange. Furthermore, it has some properties

(such as nonrepudiation) which are not offered by secret key cryptography. So why do we still use symmetric cryptography in applications?
Computers and Technology
2 answers:
SIZIF [17.4K]3 years ago
8 0

Answer:

data security and user privacy

Explanation:Symmetric algorithms provide a fairly high level of security while at the same time allowing for messages to be encrypted and decrypted quickly. The relative simplicity of symmetric systems is also a logistical advantage, as they require less computing power than the asymmetric ones. In addition, the security provided by symmetric encryption can be scaled up simply by increasing key lengths. For every single bit added to the length of a symmetric key, the difficulty of cracking the encryption through a brute force attack increases exponentially.

Rudiy273 years ago
3 0

Answer:

Advantage symmetric cryptography

Explanation:

1. The same key is used to both encrypt and decrypt messages.  

2. Symmetric key algorithms are widely applied in various types of computer systems to improve data security.

3. The security of symmetric encryption systems is based on the difficulty of randomly guessing the corresponding key to force them.

4. The Advanced Encryption Standard (AES) widely used in both secure messaging applications and cloud storage is a prominent example of symmetric encryption.

5. For every bit added to the length of a symmetric key, the difficulty of decrypting encryption using a brute force attack increases exponentially.

You might be interested in
Changing how information is represented so that it can be read by a computer is called
Jobisdone [24]

Answer:

Your answer is D) Encode

Explanation:

Definition of Encode: To change how information is represented so that it can be read by a computer.

7 0
2 years ago
Windows stores information from the Credential Manager application in secure folders called
Delicious77 [7]

Windows stores information from the Credential Manager application in secure folders called<u> VAULTS.</u>

<u></u>

Explanation:

  • A credential vault is a database used to store passwords and similar cryptographic key material.
  • The most common data stored in a credential vault are current and historical passwords to privileged accounts.
  • All credentials are saved in special folders on the computer, a place called Vaults. Moreover, you can back up all credentials to a file and restore them on to different computer.
  • Vault is a shareware program that acts as a bank vault, or safe, where you can keep you private information or files hidden and secure.
  • Everything in the vault is protected with an advanced encryption, and requires a password (your password) to open the vault to access the information.
8 0
2 years ago
What are the factors that affect self-confidence?
denis-greek [22]

Answer:

The factors that affect self confidence are not having enough faith in yourself and letting what others say about you put you down

Explanation:

Plz mark brainlest it will help me so much

5 0
2 years ago
Cameron wants to impress the owner of the company. He creates a graph that shows the improved productivity at the company over t
Umnica [9.8K]
Point, line, or bar graph is what he would use

6 0
2 years ago
Read 2 more answers
What guidelines should you follow when adding graphics to your presentations?
Elena L [17]
B, C, and D are the correct answers.
3 0
3 years ago
Read 2 more answers
Other questions:
  • MTTF is a file format developed by Microsoft commonly used on Windows systems; it offers file security, large volume size, large
    11·1 answer
  • Write a Python 3 script in PyCharm that will simulate the game of "Rock, Paper, Scissors": Display a header and the simple rules
    8·1 answer
  • In addition to using comments and track changes, you can also use the comparison feature for reviewing documents. In this activi
    11·1 answer
  • Heidi uses her computer to write articles for a newspaper. She uses a program to listen to the articles before she submits them
    5·1 answer
  • There are two main advantages to using multiple threads in a process: 1) Less work involved in creating a new thread rather than
    7·1 answer
  • Public class Square extends Shape{
    13·1 answer
  • Project light with a system of lenses used for projecting slides or film into a screen.
    5·1 answer
  • What if you accidentally delete your browser history
    7·1 answer
  • I'm having trouble with an assignment of mine. I'm making a text based adventure game for extra credit in my class and I'm stuck
    12·1 answer
  • A timer is set after each frame is sent before waiting an ACK for that frame, how long does the timer take to be expired?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!