1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maslowich
3 years ago
9

Describe how asymmetric encryption is used to send a message from User A to User B that assures data confidentiality, authentica

tion, and integrity. Be specific as to the keys used and how they achieve the three goals.
Computers and Technology
1 answer:
daser333 [38]3 years ago
8 0

Answer:

Find the explanation below.

Explanation:

Asymmetric encryption is a system of communication in technology between two parties where keys which are variable values coined by an algorithm are used to encrypt and decrypt the messages between the sender and receiver. The two types of keys used in this process are the public and private keys. The public keys can be used by anyone to encrypt messages which are then sent to the receiver who decrypts the message using his private keys. The private keys on the other hand are only shared by the person who first set up the key. In sending messages this way, the receiver's public key is gotten from a public directory, and the message encrypted by the sender. The receiver can then decrypt the message using his private keys. But if the message is encrypted using a private key, it is decrypted by the receiver with a public key.

The one-way nature of this style of communication ensures data integrity and confidentiality since users are not required to disclose their keys and only the two parties can access the message. The two end users also preserve the right to authenticate the keys. The transport layer security protocol makes use of asymmetric encryption.

You might be interested in
Need some help thanks
sergeinik [125]

Answer:

1. There are many ways to write an algorithm. Some are very informal, some are quite formal and mathematical in nature, and some are quite graphical. The instructions for connecting a DVD player to a television are an algorithm. A mathematical formula such as πR2 is a special case of an algorithm. The form is not particularly important as long as it provides a good way to describe and check the logic of the plan.  The development of an algorithm, a plan is a key step in solving a problem. Once we have an algorithm, we can translate it into a computer program in some programming language. Our algorithm development process consists of five major steps.

2. computers only do what you told them to do, so If you wrote something wrong or you wasn't precise enough it might cause a massive damage and cause you to lose a lot of money.

3. You know when a problem should be solved whenever you need to make a decision that is important, or requires human intelligence and a computer doesn’t have human intelligence.

4. The process does sound familiar to me; it is like the mechanism of operation of the computer. Through reflex actions, our bodies take in input and respond sometimes without our control, such as shivering, blinking, and sneezing.

5. The brain uses chemicals to transmit information; the computer uses electricity. Even though electrical signals travel at high speeds in the nervous system, they travel even faster through the wires in a computer. Both transmit information. A computer uses switches that are either on or off ("binary").

5 0
2 years ago
Read 2 more answers
If a node has a wireless connection to the internet, does that node have to be mobile
Marizza181 [45]
No it does not . answers
8 0
2 years ago
QUESTION 5
lesya692 [45]
I’m pretty sure D but it should be like $B2
8 0
2 years ago
What are color highlights?
SVETLANKA909090 [29]

A- overusing highlights lowers the contrast and degrads the effect of the highlights.

3 0
2 years ago
Read 2 more answers
How does the Lossy file format reduce the file size?
beks73 [17]

The answer is c. I just took it on apex n that’s what I got lol

3 0
3 years ago
Read 2 more answers
Other questions:
  • a ____ consists of wires connecting the cpu and other parts of the computer. The _____ transfers data between CPU and memory uni
    6·1 answer
  • To create a new folder, press ____.
    12·1 answer
  • To ease giving access to network resources for employees, you decide there must be an easier way than granting users individual
    9·1 answer
  • What does the Additional Clock tab do?
    11·1 answer
  • If i'm wanting to use hydra on linux to crack a password and the issue regarding hashes occurs, what shall i do?
    12·1 answer
  • #Electrical Engineering
    13·1 answer
  • One lap around a standard high-school running track is exactly 0.25 miles. Write a program that takes a number of miles as input
    12·2 answers
  • If an occupation is projected to decline by 7% over the next 10 years, how would you rate the job outlook?
    12·1 answer
  • 1110011*110011 binary multiplication
    9·2 answers
  • The _____ constraint assigns a value to an attribute when a new row is added to a table
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!