1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
e-lub [12.9K]
3 years ago
5

There may be up to three types of security algorithms to enforce encryption and integrity in TLS. These relate to

Computers and Technology
1 answer:
Mamont248 [21]3 years ago
7 0

Answer:

key exchange, encryption and secure hash.

Explanation:

TLS is an acronym for Transport Layer Security and it is a cryptographic protocol that provides authentication, privacy and data integrity on a network, usually over the internet.

Simply stated, TLS is used for providing authentication and encryption of data between two communicating systems on a network.

This ultimately implies that, TLS is a standard network protocols that provides data integrity and privacy to users when communicating over the internet or networking devices as they're made to encrypt user credentials and data from unauthorized access. TLS is an application layer protocol used for the encryption of mails sent over the internet, in order to protect user information such as username and password.

There are three (3) types of security algorithms to enforce encryption and integrity in TLS. This includes;

I. Key exchange.

II. Encryption.

III. Secure hash.

You might be interested in
What general strategies can the network managers use to reduce congestions?
Harrizon [31]

Answer:

 There are different types of strategies that can be used by the network manager for reducing the congestion are as follows:

  • By monitoring the traffic of the network properly we can easily reduce the congestion in the network.
  • By segmenting the network properly, it helps to reduce the network congestion.
  • We can also reconfiguring the TCP/IP (Transmission control protocol) setting on the network.
  • We can also use the backpressure routing technique.

7 0
3 years ago
In your own words, explain at least one reason why programming languages have functions.
Nataly [62]
Programming languages have functions because, they are the set of operations that may be applied to objects of that particular class.
for an example I will attach a function, you just check it

brainliest pls

5 0
4 years ago
Setting your __________ will prevent you from having to type your name in every email.
Kay [80]

I believe its D. Signature.

7 0
3 years ago
Read 2 more answers
Calcule o resultado em cada caso atividade de matemática poder me ajudar<br><br>​
Phoenix [80]

Answer:

I do not understand can you type in English?

Explanation:

7 0
3 years ago
What is an Array? 20 POINTS!!!
EastWind [94]

Answer:

I'm about 99% sure it's C: a unique address or location un the collection

6 0
2 years ago
Other questions:
  • Which is the fastest method of sharing public folders?
    8·1 answer
  • Briefly explain what is net neutrality and why is it important today
    15·1 answer
  • Jennifer's company currently uses Windows Active Directory to provide centralized authentication, authorization, and accounting
    14·1 answer
  • The implementation stage of the SDLC _____.
    7·1 answer
  • Speed is how fast an object moves a certain distance within a length of time. How is speed calculated?
    14·2 answers
  • a third important logical element is the inverter. an inverter does pretty much what it says. if the input is 0, the output is 1
    13·1 answer
  • ANYONE GOOD WITH CODING IN C++
    14·1 answer
  • Letter only ^_____^!
    8·1 answer
  • Which of these is installed only on Apple smartphones and tablets?
    5·2 answers
  • Real estate management software
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!