1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksandrvk [35]
3 years ago
9

Public-key cryptography can be used for encryption (ElGamal for instance) and key exchange. Furthermore, it has some properties

(such as nonrepudiation) which are not offered by secret key cryptography. So why do we still use symmetric cryptography in applications?
Computers and Technology
2 answers:
SIZIF [17.4K]3 years ago
8 0

Answer:

data security and user privacy

Explanation:Symmetric algorithms provide a fairly high level of security while at the same time allowing for messages to be encrypted and decrypted quickly. The relative simplicity of symmetric systems is also a logistical advantage, as they require less computing power than the asymmetric ones. In addition, the security provided by symmetric encryption can be scaled up simply by increasing key lengths. For every single bit added to the length of a symmetric key, the difficulty of cracking the encryption through a brute force attack increases exponentially.

Rudiy273 years ago
3 0

Answer:

Advantage symmetric cryptography

Explanation:

1. The same key is used to both encrypt and decrypt messages.  

2. Symmetric key algorithms are widely applied in various types of computer systems to improve data security.

3. The security of symmetric encryption systems is based on the difficulty of randomly guessing the corresponding key to force them.

4. The Advanced Encryption Standard (AES) widely used in both secure messaging applications and cloud storage is a prominent example of symmetric encryption.

5. For every bit added to the length of a symmetric key, the difficulty of decrypting encryption using a brute force attack increases exponentially.

You might be interested in
What symbol precedes all structured references in formula autocomplete lists?
Zolol [24]
Structured references make it easier to use formulas with Excel tables by ... Use brackets around specifiers All table, column, and special item ...
4 0
2 years ago
____ involves taking data from your database and putting it into an electronic file in a format that another external applicatio
steposvetlana [31]

Answer:

The answer is "Option c".

Explanation:

In the database dumping a folder for configuration, which information in the file is called a document spill.  In Plesk, exporting a database dump is a file that can be used for storage or delivery, and then preserves a source database is known as Exporting, and other choices are not correct, that are described as follows:

  • Importing, It is a dump in a database, that includes retrieving data from the data in a database location, that's why it's wrong.
  • Enhancing, It automatically improves data, that's why it's wrong.
  • Extracting, It is used in data analyzing and trapped to obtain necessary data from sources, that's why it is wrong.
3 0
3 years ago
One concern some users have about storing data or accessing applications in the cloud is .
andriy [413]

Answer:

Explanation:

Security is the primary concern about cloud computing. This is the main for many IT departments to refrain from using cloud computing. Some things that put the security of cloud computing to be concerned are: Theft or loss of intellectual property.

3 0
2 years ago
Select the correct answer. Hudson has to maintain confidential college data in a spreadsheet. He needs two team members to help
AlladinOne [14]

Answer:

B. Protection

Explanation:

It is the protection tab. We can protect a cell from being changed or altered by any other user of the excel sheet using the protection tab. We only need to select the cell, and right-click, Now choose the protection tab, which will be shown. And now select locked and click ok. This cell cannot then be changed by anyone else other than you. Hence, the correct option here is the protection tab.

4 0
3 years ago
What allows a programmer to write code quickly and efficiently for an action that must be repeated?
Marta_Voda [28]
An literation :))!! i hope u get it right lol
6 0
2 years ago
Read 2 more answers
Other questions:
  • True False The explicit location always tells you where users are located when they type the query.
    10·2 answers
  • Write code statements to create a DecimalFormat object that will round a formatted value to four decimal places. Then write a st
    15·1 answer
  • Graphic images can be stored in a variety of formats including ____.
    15·1 answer
  • Only business writing requires an editing stage
    8·1 answer
  • What is the meaning for science?
    14·1 answer
  • There exists a data type Date with member function Increment that increments the current Date object by one. The ++ operator is
    7·1 answer
  • Imagine you are responsible for making a presentation that includes a representation of the logic flow through a process. You un
    11·1 answer
  • Anyone have an answer for 4.9 lesson code practice
    9·1 answer
  • The___ allows you quickly access features such as formatting, charting, tables, and totals
    11·1 answer
  • define a computer, state its 3 main activities with examples of the functions of each of those activities​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!