1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lions [1.4K]
3 years ago
8

tls Explain in your own words how, by applying both asymmetric and symmetric encryption, your browser uses TLS to protect the pr

ivacy of the information passing between your browser and a web server.
Computers and Technology
1 answer:
Aloiza [94]3 years ago
7 0

Answer:

This question is about sending and receiving keys using TLS protocol.

Asymmetric encryption is slower than symmetric encryption.

Orders of magnitude slower.

Given the same length key

length asymmetric is much weaker than symmetric bit for bit.

Therefore you need a much larger key to provide equivalent protection this is also contributes to the slowness method in asymmetric. Asymmetric encryption carries with it an increase in the size of output. For instance if you use an encrypted data is at least 10% larger than the clear text.

Symmetric encryption on the other hand has a fixed size overhead even when encrypting giga bytes of data. Asymmetric encryption algorithms are for less efficient than symmetric algorithms so essentially all use of encryption via asymmetric keys involves encrypting make symmetric session key with which the actual messages is encrypted.

Asymmetric Cryptography enables anyone to encrypt messages that only one participant will be able to decrypt and allows anyone to verify messages that only one participant have signed.

Symmetric Cryptography is more faster than the asymmetric cryptography.

Security is not really a concern between symmetric and asymmetric cryptography. Asymmetric Cryptography can solve problems which are not solved by symmetric, for the remaining symmetric Cryptography is used because it is so much faster than asymmetric.

symmetric Cryptography is much faster then it is have higher security margin, common key sizes 128 bit AES. Asymmetric Cryptography runs on smaller margins as it have poor performance.

Explanation:

You might be interested in
"bing ads keyword planner allows you to search for new keywords using a phrase, website, or category. from which bing ads tabs c
MrRissso [65]
<span>The navigation is very simple

1.On the top menu, click Tools -> click Keyword Planner.

2.Then you can click Search for new keywords using a phrase, website, or category.

In case if you want to multiply key word list to get new keywords, follow below steps.

1.On the top menu, click Tools -> click Keyword Planner.

2.Click Multiply keyword lists to get new keywords.</span>
8 0
4 years ago
Two files named numbers1.txt and numbers2.txt both have an unknown number of lines, each line consisting of a single positive in
Reika [66]

Answer:

see explaination for program code

Explanation:

scalar_product = 0

li=[]

li2=[]

#reading numbers1.txt and numbers2.txt intoli and li2 respectively

with open('numbers1.txt') as n1, open('numbers2.txt') as n2:

for line1 in n1:

li.append(int(line1))

for line2 in n2:

li2.append(int(line2))

#storing min list size into variable l

a=len(li)

b=len(li2)

if a<b:

l=a

else:

l=b

#calculating scalar product

for i in range(l):

scalar_product=scalar_product+li[i]*li2[i]

print("scalar product is",scalar_product)

6 0
4 years ago
Write a statement that increments numUsers if updateDirection is 1, otherwise decrements numUsers. Ex: if numUsers is 8 and upda
Lady_Fox [76]

Answer:

Following are the statement is given below

if(updateDirection ==1) // check condition

{

++numUsers; // increments the value

}

else

{

--numUsers; // decrement the value

}

Explanation:

Following are the description of statement

  • Check the condition in the if block .If the "updateDirection" variable is 1 then then control moves to the if block otherwise control moves to the else block statement.
  • In the if  block the statement is "++numUsers" it means it increment the value by 1 .
  • In the else block the statement is "--numUsers" it means it decrement  the value by 1 .

4 0
3 years ago
Trent is a skilled sketch artist who wants to create images for his online portfolio. He is even
Sidana [21]

Answer: A digital tablet

Explanation: a scanner wouldnt show how to draw, a stock image would just show an image, phtot editing is to edit a picture took like to change the light. The answer is Digital tablet because you can draw on it while recording.

8 0
3 years ago
What is a data dictionary, what does it contain, and how is it used?
seropon [69]
A data dictionary<span> is a collection of descriptions of </span>data<span> objects or items in a </span>data <span>model for the benefit of programmers and others who need to refer to them. The first step in analyzing a system of objects with which users interact is to identify each object and its relationship to other objects.</span>
7 0
3 years ago
Other questions:
  • What symbol following a menu command lets you know that a dialog box will be displayed?
    14·1 answer
  • Why are there 2 types of ip addresses like 172.16.254.1 or 2001:db8:0:1234:0:567:8:1?
    10·1 answer
  • A ______________ deals with the potential for weaknesses within the existing infrastructure to be exploited.
    10·2 answers
  • Which statement is unnecessary inside the unit test for the custom controller?
    9·1 answer
  • What type of malware can, for example, locks up a user's computer and then display a message that purports to come from a law en
    9·1 answer
  • CLICK ME IF U DARE hehehe
    10·2 answers
  • The science of how an object reacts to its motion through air is called _______________. (12 letters)
    13·2 answers
  • Which design monument beginning with A inspired the chrysler building in New York​
    14·1 answer
  • Write a Python statement that displays the value referenced by the number variable formatted as1,234,567.5
    9·1 answer
  • What equipment allows a computer to connect to the internet.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!