1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivann1987 [24]
3 years ago
12

As we have seen in this chapter, public-key cryptography can be used for encryption and key exchange. Furthermore, it has some p

roperties (such as nonrepudiation) which are not offered by secret key cryptography. So why do we still use symmetric cryptography in current applications?
Computers and Technology
1 answer:
Savatey [412]3 years ago
7 0

Answer:

Disadvantages of public key cryptography is that : Assymetric cryptography is slower than the private key cryptography.

Explanation:

We are dealing with big data applications most of time. Almost all applications are data intensive. Private key cryptography which is also known as symmetric cryptography. Symmetric cryptography based systems are faster. Since there is no key transmitted with the data, encrypted data can be transferred over the channel or session even if the path is vulnerable or have chances of interception as the chances of decrypting the data is almost impossible.

Also, The identity of the receiver is guaranteed using the password based authentication used by symmetric crypto systems. Only the trusted receiver who has the access to the secret key can only decrypt the payload

Public Key Cryptography is slower than private key cryptography. Today’s application’s are data intensive. In case of data intensive applications , encrypting huge data will take a lot more time than that of symmetric key cryptography. Whenever Bulk data transmission is needed symmetric key cryptography is preferred. Secret key based crypto systems have proven to be more faster than any currently available assymetric key based crypto systems.

You might be interested in
Can I have some help?
Ad libitum [116K]
I believe its A as the image provided says plain message
6 0
2 years ago
Sets of rules that a computer uses to solve problems?
jonny [76]

Protocal

I need to make this 20 charaters so ye

8 0
3 years ago
Read 2 more answers
30 points! Help me out, please! I need help with this!
White raven [17]

Answer:

Both are touchscreen.

Tablets are seen more as an entertainment device (tv, games, etc.).

Phones are smaller, and used more for everything; you can take phones anywhere you go, whereas tablets are more difficult to transport.

7 0
3 years ago
Why should technology be used. No plagiarism pls.
olga nikolaevna [1]

Answer:

Explanation:

mobile devices and the applications they help us in life devisec can individualize instruction. three specific reasons that technology is good is that it saves lives by improving medicine, keeps us connected to each other, and provides education and entertainment. One reason why technology is good is that it has saved many lives.

3 0
3 years ago
Read 2 more answers
Alex is setting up a network for his company's computers. He installs a circuit board into each computer, enabling it to be conn
Nitella [24]
If it's an ethernet network:  <span>network interface card</span>
6 0
3 years ago
Other questions:
  • Chris needs to modify the default bullets that are used in a nonnumbered list in word. Which method should he use?
    9·2 answers
  • 2. What does the Action tool allow you to do in Microsoft PowerPoint? (20 points)
    12·2 answers
  • To insert notes into a worksheet, insert ________ in cells.
    15·1 answer
  • WILL GIVE BRAINLIEST! I'm doing a project at school. Does anyone have any good explanations for Digital Art? I need it to be at
    13·2 answers
  • Which of the following would be a tradeoff of a scientific advancement that enables us to catch fish from the ocean faster than
    5·1 answer
  • Introduction to Identity and Fitting In
    7·1 answer
  • Write a line of code to convert time to hours. Remember there are 60 minutes in an hour. Then write a line of code to calculate
    9·2 answers
  • In batch operating system three job J1 J2 and J3 are submitted for execution each job involes an I/O activity a CPU time and ano
    13·1 answer
  • What is one of the main problems with shared web hosting? Select one: Sites that share resources are less susceptible to hacking
    8·1 answer
  • MSWord is a popular___________ program.​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!