1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maslowich
3 years ago
9

Describe how asymmetric encryption is used to send a message from User A to User B that assures data confidentiality, authentica

tion, and integrity. Be specific as to the keys used and how they achieve the three goals.
Computers and Technology
1 answer:
daser333 [38]3 years ago
8 0

Answer:

Find the explanation below.

Explanation:

Asymmetric encryption is a system of communication in technology between two parties where keys which are variable values coined by an algorithm are used to encrypt and decrypt the messages between the sender and receiver. The two types of keys used in this process are the public and private keys. The public keys can be used by anyone to encrypt messages which are then sent to the receiver who decrypts the message using his private keys. The private keys on the other hand are only shared by the person who first set up the key. In sending messages this way, the receiver's public key is gotten from a public directory, and the message encrypted by the sender. The receiver can then decrypt the message using his private keys. But if the message is encrypted using a private key, it is decrypted by the receiver with a public key.

The one-way nature of this style of communication ensures data integrity and confidentiality since users are not required to disclose their keys and only the two parties can access the message. The two end users also preserve the right to authenticate the keys. The transport layer security protocol makes use of asymmetric encryption.

You might be interested in
From the given programs and application given above, choose one that you prefer to use in making a computer-generated art and wh
nata0808 [166]
More information is needed to answer this question
4 0
3 years ago
Edhesive 6.1 Code Practice
Mariulka [41]

What kind of question is this?

6 0
3 years ago
Read 2 more answers
What are the XML technologies used in SOA?
saw5 [17]

Answer:

There are three technologies used for implementing the SOA most commonly with Web services are UDDI (Universal Description, Discovery & Integration) , WSDL (Web Services Description Language) and  SOAP (Simple Object Access Protocol) .

Out of them XML technologies are Web Services Description Language (WSDL) and Simple Object Access Protocol (SOAP).

WSDL is an XML language that describes a Web service.

SOAP is an XML Protocol and it is used by client application to communicate with web services.

8 0
3 years ago
Frame from one LAN can be transmitted to another LAN via the device is:_____.
andreyandreev [35.5K]

Answer:

B) Bridge.

Explanation:

LAN refers to a local area network in which the network of computer are interconnected in less than an area which is limited i.e. school, university, residence, office building, etc

It is used to share a common line of communication within a less geographic area.

In order to transmit one LAN to the another LAN, the device we called as a bridge

Therefore the correct option is B. bridge

3 0
3 years ago
True or false you can use Facebook live feed tool to<br> broadcast content as you post it
I am Lyosha [343]
True, you can post stuff on Facebook in real time.
4 0
3 years ago
Other questions:
  • Which best describes the relationship between maximum cost-per-click (max. cpc) bids and ad rank?
    12·1 answer
  • What is the meaning of ethics? Check all of the boxes that apply
    13·1 answer
  • Graphs and charts are two different elements. True or False
    15·1 answer
  • Upon looking out at the
    8·2 answers
  • Which of the following accurately describe the
    9·2 answers
  • Which of the following are input devices? Check all that apply.
    9·2 answers
  • Which of the following scenarios describes an IT professional using the Internet and computer system access in an unprofessional
    7·1 answer
  • Subscribe too my you tube channel for a brainiest
    15·1 answer
  • Identify the correct answer in each item. Write your answer on the blank provided before
    13·1 answer
  • Write a short-essay discussing your own stand on social media usage for students.​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!