1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maslowich
4 years ago
9

Describe how asymmetric encryption is used to send a message from User A to User B that assures data confidentiality, authentica

tion, and integrity. Be specific as to the keys used and how they achieve the three goals.
Computers and Technology
1 answer:
daser333 [38]4 years ago
8 0

Answer:

Find the explanation below.

Explanation:

Asymmetric encryption is a system of communication in technology between two parties where keys which are variable values coined by an algorithm are used to encrypt and decrypt the messages between the sender and receiver. The two types of keys used in this process are the public and private keys. The public keys can be used by anyone to encrypt messages which are then sent to the receiver who decrypts the message using his private keys. The private keys on the other hand are only shared by the person who first set up the key. In sending messages this way, the receiver's public key is gotten from a public directory, and the message encrypted by the sender. The receiver can then decrypt the message using his private keys. But if the message is encrypted using a private key, it is decrypted by the receiver with a public key.

The one-way nature of this style of communication ensures data integrity and confidentiality since users are not required to disclose their keys and only the two parties can access the message. The two end users also preserve the right to authenticate the keys. The transport layer security protocol makes use of asymmetric encryption.

You might be interested in
What is the command to list files in Unix and Unix like operating system?​
emmasim [6.3K]

Answer:

In computing, ls is a command to list computer files in Unix and Unix-like operating systems. LS is specified by POSIX and the Single UNIX Specification.

8 0
3 years ago
Pat practices on the keyboard to improve his typing speed. When he typed the sentence It was a rainy day, he missed typing the l
Assoli18 [71]

Answer:

94.4% Typing accuracy

1 error per minute

Explanation:

The sentence "It was a rainy day" contains five words and 18 characters (including spaces). Therefore, since Pat typed this sentence in a minute then his typing accuracy is

(17 / 18) * 100 = 94.4% Typing accuracy

That is because he typed 17 out of the 18 characters correctly in the sentence. Pat's error rate on the other hand is

1 / 1 = 1 error per minute

This is because in the span of one minute that it took to type the entire sentence Pat only made one error.

3 0
3 years ago
Write a query that returns the first name of a student whose last name is "Patil" and is in the Ravenclaw house.
NeX [460]

Answer:

SELECT first_name FROM student WHERE last_name = "Patil"

Explanation:

The SELECT clause is used to read data from a table in a relational database, the FROM clause specifies the table from which data is retrieved while the FROM clause returns the rows of data that meet a given condition.

5 0
3 years ago
_______ allows you to add formatting such as shapes and colors to text.
Svetach [21]
Worddesign allows you to add formatting such as shapes and colours to text
7 0
4 years ago
Which of the following are good ways to keep your information and your computer secure?
Assoli18 [71]

Answer:

the correct answer is E

I do all of these so I would assume E

4 0
3 years ago
Read 2 more answers
Other questions:
  • You are angry at a friend who forgot to meet you for lunch, and you decide to write an e-mail about how it made you feel. What s
    11·2 answers
  • What is not soured of income
    6·1 answer
  • Which of the following, (1) money deposited in a bank account, (2) student recording her answer to a question in an online test,
    14·1 answer
  • )In a graph represented by adjacency matrix u can find all the neighbours of a given vertices in ____Operations
    6·1 answer
  • Read the scenario and then answer the question using only the information provided.
    14·2 answers
  • When your grounded and the only thing you can get on is a computer........................oh welllllllllllllllllllllllllllllllll
    7·1 answer
  • create a function that draws a certain number of spaces, followed by a certain number of stars, followed by a newline.
    6·1 answer
  • (1101101)2 − (1001)2
    15·1 answer
  • Analyze the sentence below . choose your answer on the box below write your answer in your quiz notebook
    5·1 answer
  • Which of the following variables are string types?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!