1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maslowich
3 years ago
9

Describe how asymmetric encryption is used to send a message from User A to User B that assures data confidentiality, authentica

tion, and integrity. Be specific as to the keys used and how they achieve the three goals.
Computers and Technology
1 answer:
daser333 [38]3 years ago
8 0

Answer:

Find the explanation below.

Explanation:

Asymmetric encryption is a system of communication in technology between two parties where keys which are variable values coined by an algorithm are used to encrypt and decrypt the messages between the sender and receiver. The two types of keys used in this process are the public and private keys. The public keys can be used by anyone to encrypt messages which are then sent to the receiver who decrypts the message using his private keys. The private keys on the other hand are only shared by the person who first set up the key. In sending messages this way, the receiver's public key is gotten from a public directory, and the message encrypted by the sender. The receiver can then decrypt the message using his private keys. But if the message is encrypted using a private key, it is decrypted by the receiver with a public key.

The one-way nature of this style of communication ensures data integrity and confidentiality since users are not required to disclose their keys and only the two parties can access the message. The two end users also preserve the right to authenticate the keys. The transport layer security protocol makes use of asymmetric encryption.

You might be interested in
The function below takes one parameter: an integer (begin). Complete the function so that it prints the numbers starting at begi
arlik [135]

Answer:

Program is in C++

Explanation:

C++ Code

1) By using For Loop

void forLoopFunction(int value){

for(int start=value; start>0; start--){

 cout<<start<<endl;

}

}

Explanation

Start for loop by assigning the loop variable to parameter value and condition will be that loop variable will be greater then 0 and at the end decrements the loop variable.

2) By usin WhileLoop

void whileLoopFunction(int value){

 while(value>0){

 cout<<value<<endl;

 value--;

 }

}

Explanation

In while loop first add the condition as variable must be greater then 0 and then print the value with endl sign to send the cursor to next line and at the end of the loop decrements the variable.

8 0
2 years ago
which of the following best describes the internet of things? a. a stand-alone computer that controls motors b. a microprocessor
ziro4ka [17]

The option that best describes the internet of things is option c. the digitization of our everyday world.

<h3>What is IoT and how does it operate?</h3>

The internet of things, or IoT, is an interconnected network of computing devices, mechanical and digital machines, objects, animals, or people who are given unique identifiers (UIDs) and the capacity to transfer data over a network without the need for human-to-human or human-to-computer interaction.

The Internet of Things, also known as IoT, is the collective network of interconnected devices and the technology that enables communication between them as well as between them and the cloud.

Hence, The term "Internet of things" refers to actual physical things that have sensors, processing power, software, and other technologies, connect to other systems and devices via the Internet or other communications networks, and exchange data with them.

Learn more about internet of things from

brainly.com/question/28521945
#SPJ1

7 0
1 year ago
Which of the following pieces of information would be safe to include in an online username?
yaroslaw [1]

Answer:

Favorite sport .

Explanation:

<em>A school mascot would be unsafe to be associated with your online username as potential hackers and strangers would have an idea where school do you attend. </em>

<em> Year of birth would also be unsafe as it would give them an idea when you were born. Also, birthdates are often part of registrations in websites and even in the offline world.  </em>

<em> City of residence is also unsafe to be used as you would give attackers and online strangers to know where do you live.  </em>

7 0
3 years ago
Read 2 more answers
6. Multiply: (x – 4)(x + 5)<br><br>​
Roman55 [17]
X^2-4x+5x-20
X^2+x-20
5 0
2 years ago
Which of the following is TRUE about a TCF Free Student Checking Account?
baherus [9]

Answer:

C

Explanation:

3 0
3 years ago
Other questions:
  • Given a computer running four types of instuctions, named classes A through D, calculate the execution time of a program that ha
    5·1 answer
  • How can my computer catch a virus?
    13·1 answer
  • Compare GBN, SR, and TCP (no delayed ACK). Assume that the timeout values for all three protocols are sufficiently long such tha
    11·1 answer
  • If a network device has a mask of /28, how many IP addresses are available for hosts on this network?
    5·1 answer
  • WILL GIVE MORE POINTS, PLEASE HELP!!!
    11·1 answer
  • What is spread sheet software?​
    11·1 answer
  • Which software programs should students avoid using to create and submit course work? (Choose all that apply). Word, Pages, Numb
    13·1 answer
  • If a document is stored on a file server but team members can edit the document​ anonymously, the content on the file server is:
    14·1 answer
  • A large number of genetic codes are stored as binary values in a list. Which one of the following conditions must be true in ord
    5·2 answers
  • Ron is creating building blocks in Word. How can he make the building blocks that he created available?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!