1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lions [1.4K]
3 years ago
8

tls Explain in your own words how, by applying both asymmetric and symmetric encryption, your browser uses TLS to protect the pr

ivacy of the information passing between your browser and a web server.
Computers and Technology
1 answer:
Aloiza [94]3 years ago
7 0

Answer:

This question is about sending and receiving keys using TLS protocol.

Asymmetric encryption is slower than symmetric encryption.

Orders of magnitude slower.

Given the same length key

length asymmetric is much weaker than symmetric bit for bit.

Therefore you need a much larger key to provide equivalent protection this is also contributes to the slowness method in asymmetric. Asymmetric encryption carries with it an increase in the size of output. For instance if you use an encrypted data is at least 10% larger than the clear text.

Symmetric encryption on the other hand has a fixed size overhead even when encrypting giga bytes of data. Asymmetric encryption algorithms are for less efficient than symmetric algorithms so essentially all use of encryption via asymmetric keys involves encrypting make symmetric session key with which the actual messages is encrypted.

Asymmetric Cryptography enables anyone to encrypt messages that only one participant will be able to decrypt and allows anyone to verify messages that only one participant have signed.

Symmetric Cryptography is more faster than the asymmetric cryptography.

Security is not really a concern between symmetric and asymmetric cryptography. Asymmetric Cryptography can solve problems which are not solved by symmetric, for the remaining symmetric Cryptography is used because it is so much faster than asymmetric.

symmetric Cryptography is much faster then it is have higher security margin, common key sizes 128 bit AES. Asymmetric Cryptography runs on smaller margins as it have poor performance.

Explanation:

You might be interested in
Your team at amazon is overseeing the design of a new high-efficiency data center at hq2. a power grid need to be generated for
elixir [45]

Answer:

void print2(int row) {

for (int i = 0; i < row; i++) {

 char ch = 'a';

 char print = ch;

 for (int j = 0; j <= i; j++) {

  cout << print++;

 }

 cout << endl;

}

}

int count_digits(int num) {

int count = 0;

int temp = num;

while (temp != 0) {

 temp = temp / 10;

 count++;

}

return (num % count);

}

Explanation:

3 0
2 years ago
Write a test program that creates two Rectangle objects—one with width 4 and height 40 and the other with width 3.5 and height 3
BARSIC [14]

Answer:

public class Rectangle {

   private double width;

   private double heigth;

   public Rectangle(double width, double heigth) {

       this.width = width;

       this.heigth = heigth;

   }

   public double getWidth() {

       return width;

   }

   public void setWidth(double width) {

       this.width = width;

   }

   public double getHeigth() {

       return heigth;

   }

   public void setHeigth(double heigth) {

       this.heigth = heigth;

   }

   public double perimeter(double width, double heigth){

       double peri = 2*(width+heigth);

       return peri;

   }

   public double area(double width, double heigth){

       double area = width*heigth;

       return  area;

   }

}

class RectangleTest{

   public static void main(String[] args) {

       //Creating two Rectangle objects

       Rectangle rectangle1 = new Rectangle(4,40);

       Rectangle rectangle2 = new Rectangle(3.5, 35.7);

       //Calling methods on the first Rectangel objects

       System.out.println("The Height of Rectangle 1 is: "+rectangle1.getHeigth());

       System.out.println("The Width of Rectangle 1 is: "+rectangle1.getWidth());

       System.out.println("The Perimeter of Rectangle 1 is: "+rectangle1.perimeter(4,40));

       System.out.println("The Area of Rectangle 1 is: "+rectangle1.area(4,40));

       // Second Rectangle object

       System.out.println("The Height of Rectangle 2 is: "+rectangle2.getHeigth());

       System.out.println("The Width of Rectangle 2 is: "+rectangle2.getWidth());

       System.out.println("The Perimeter of Rectangle 2 is: "+rectangle2.perimeter(4,40));

       System.out.println("The Area of Rectangle 2 is: "+rectangle2.area(4,40));

   }

}

Explanation:

  • Firstly A Rectangle class is created with two fields for width and heigth, a constructor and getters and setters the class also has methods for finding area and perimeters
  • Then a RectangleTest class containing a main method is created and two Rectangle objects are created (Follow teh comments in the code)
  • Methods to get height, width, area and perimeter are called on each rectangle object to print the appropriate value
5 0
3 years ago
The following code should take a number as input, multiply it by 8, and print the result. In line 2 of the code below, the * sym
Juli2301 [7.4K]

Answer:

num = int(input("enter a number:"))

print(num * 8)

Explanation:

num is just a variable could be named anything you want.

if code was like this num = input("enter a number:")

and do a print(num * 8)

we get an error because whatever the user puts in input comes out a string.

we cast int() around our input() function to convert from string to integer.

therefore: num = int(input("enter a number:"))

will allow us to do  print(num * 8)

6 0
4 years ago
1. What are the advantages and disadvantages of technology in communication?
Gennadij [26K]

Answer:

ADVANTAGES:

First, the evolution of technology is beneficial to humans for several reasons. At the medical level, technology can help treat more sick people and consequently save many lives and combat very harmful viruses and bacteria.

2-Technology has also increased the productivity of almost every industry in the world. Thanks to technology, we can even pay with bitcoins instead of using banks

DISADVANTAGES:

1-Lack of Privacy. You might think that a quick text or IM offers more privacy than a telephone call in a crowded room. ...

2-Distraction from Real Life. ...

3-Potential for Misunderstanding. ...

4-Decline of Grammar and Spelling...

5- Near people are far and far people are near through communication technology. we have no time to sit with our relatives but constantly communicate far away people . I think this is biggest <em>disadvantage </em>

Explanation:

7 0
3 years ago
Read 2 more answers
A simple system is to be designed to allow for the selling of old books. There are two different types of users: buyers and sell
VMariaS [17]
Yes yes yes yes yeah yes
7 0
4 years ago
Other questions:
  • How does information technology most benefit people’s personal and professional lives?
    9·2 answers
  • What software is typically used for larger systems?
    11·1 answer
  • Which setting indents all but the first line of a paragraph by the selected length?
    6·1 answer
  • Syntax errors ________. a. result from an attempt to perform an operation that cannot executeb. are errors such as misspelled ke
    14·1 answer
  • Accepting criticism is a trait of what people?
    5·1 answer
  • A function ________ contains the statements that make up the function.
    5·1 answer
  • FIGURE A-1—Use the information in this chart to answer Question 1.
    6·1 answer
  • To what would you compare the transport layer?
    12·1 answer
  • Three reasons Why we connect speakers to computers
    15·2 answers
  • reagan's firm has not had to make large investments in computer or networking hardware or in personnel to maintain the hardware
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!