1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivann1987 [24]
2 years ago
12

As we have seen in this chapter, public-key cryptography can be used for encryption and key exchange. Furthermore, it has some p

roperties (such as nonrepudiation) which are not offered by secret key cryptography. So why do we still use symmetric cryptography in current applications?
Computers and Technology
1 answer:
Savatey [412]2 years ago
7 0

Answer:

Disadvantages of public key cryptography is that : Assymetric cryptography is slower than the private key cryptography.

Explanation:

We are dealing with big data applications most of time. Almost all applications are data intensive. Private key cryptography which is also known as symmetric cryptography. Symmetric cryptography based systems are faster. Since there is no key transmitted with the data, encrypted data can be transferred over the channel or session even if the path is vulnerable or have chances of interception as the chances of decrypting the data is almost impossible.

Also, The identity of the receiver is guaranteed using the password based authentication used by symmetric crypto systems. Only the trusted receiver who has the access to the secret key can only decrypt the payload

Public Key Cryptography is slower than private key cryptography. Today’s application’s are data intensive. In case of data intensive applications , encrypting huge data will take a lot more time than that of symmetric key cryptography. Whenever Bulk data transmission is needed symmetric key cryptography is preferred. Secret key based crypto systems have proven to be more faster than any currently available assymetric key based crypto systems.

You might be interested in
Print a message telling a user to press the letterToQuit key numPresses times to quit. End with newline. Ex: If letterToQuit = '
LekaFEV [45]

Answer:

#include <stdio.h>

int main(void) {

char letterToQuit = '?';

int numPresses = 0;

printf("Press the %c key %d times to quit ", letterToQuit, numPresses);

return 0;}

Explanation:

in print statement %c is replaced by value of  variable 'letterToQuit'and %d is replaced by value of variable 'numPresses'

3 0
3 years ago
The three main objectives of information security are.
kotykmax [81]

Answer:

confidentiality, integrity, availability

Explanation:

Confidentiality: Data and information assets must be confined to people who have authorized access and not disclosed to others

Integrity: Keeping the data intact, complete and accurate, and IT systems operational

Availability: An objective indicating that information or system is at disposal of authorized users when needed.

8 0
2 years ago
In a five-choice multiple-choice test, which letter is most often the correct
tatiyna

I believe the answer is C.

5 0
3 years ago
Read 2 more answers
When you are saving a file, what does word suggest by default as the name of the document?
LenaWriter [7]
Whatever you have written on the page is what it'll name it.
5 0
3 years ago
Read 2 more answers
Does an android tablet have a hard drive
Kisachek [45]
No, it uses flash menory
3 0
3 years ago
Other questions:
  • When did the silver market drop sharply, hurting Bolivia's income?
    7·2 answers
  • Objective:This assignment is designed to give you experience with thinking about algorithm analysis and performanceevaluation.Pr
    11·1 answer
  • Jackson is teaching the decimal number system. He wants his students to know how to expand numbers by powers of 10. Which is the
    13·2 answers
  • True or false? if the copyright date on the homepage is more than 1 year old, the website should always be considered unmaintain
    5·1 answer
  • Which port-authentication network access control standard forces devices to go through a full authentication, authorization, and
    13·1 answer
  • The Daily Trumpet newspaper accepts classified advertisements in 15 categories such as Apartments for Rent and Pets for Sale. De
    9·1 answer
  • Why are control components necessary in traditional software and generally not required in object-oriented software?​
    11·1 answer
  • A task-oriented leader is ideal for a creative workplace.
    8·2 answers
  • What can i say back to my IT school lady?
    8·1 answer
  • I need help pls help me
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!