1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena-14-01-66 [18.8K]
3 years ago
15

100 POINTS!!!!!!

Computers and Technology
1 answer:
Veronika [31]3 years ago
3 0

Answer:

The fundamental limitation of symmetric (secret key) encryption is ... how do two parties (we may as well assume they are Alice and Bob) agree on a key? In order for Alice and Bob to communicate securely they need to agree on a secret key. In order to agree on a secret key, they need to be able to communicate securely. In terms of the pillars of IA, To provide CONFIDENTIALITY, a secret key must first be shared. But to initially share the key, you must already have CONFIDENTIALITY. It's a whole chicken-and-egg problem.

This problem is especially common in the digital age. We constantly end up at websites with whom we decide we want to communicate securely (like online stores) but with whom we there is not really an option to communicate "offline" to agree on some kind of secret key. In fact, it's usually all done automatically browser-to-server, and for the browser and server there's not even a concept of "offline" — they only exist online. We need to be able to establish secure communications over an insecure channel. Symmetric (secret key) encryption can't do this for us.

Asymmetric (Public-key) Encryption

Yet one more reason I'm barred from speaking at crypto conferences.

xkcd.com/177/In asymmetric (public key) cryptography, both communicating parties (i.e. both Alice and Bob) have two keys of their own — just to be clear, that's four keys total. Each party has their own public key, which they share with the world, and their own private key which they ... well, which they keep private, of course but, more than that, which they keep as a closely guarded secret. The magic of public key cryptography is that a message encrypted with the public key can only be decrypted with the private key. Alice will encrypt her message with Bob's public key, and even though Eve knows she used Bob's public key, and even though Eve knows Bob's public key herself, she is unable to decrypt the message. Only Bob, using his secret key, can decrypt the message ... assuming he's kept it secret, of course.

Explanation:

You might be interested in
What should you do if a headset plugged into your computer is not working properly.
NemiM [27]
Ether get a new headset or take out the plug blow on it or wipe it or clean the inside of the computer where the headset wire goes
7 0
2 years ago
Mr. Brody made a spreadsheet with student names in order to take attendance. Which method is best for sorting this data?
user100 [1]
Maybe alphabetical order 
6 0
3 years ago
Read 2 more answers
Which component of cpu controls the overall operation of computer..​
arsen [322]

Answer:

Control Unit.

Explanation:

The component of CPU that controls the overall operation of computer is control unit.

The control unit, also known as CU, is one of the main component of the Central Processing Unit (CPU). The function of CU is to fetch and instruct computer's logic unit, memory, input and output device. The CU receives information which it turns into signals. Thus controlling the overall operations of computer.

Therefore, control unit is the correct answer.

4 0
3 years ago
To access WordPad, Jill will click on Start, All Programs, Accessories, and WordPad. To access Notepad, Karl will click on Start
NARA [144]
The answer is B, Both Jill and Karl are correct.
7 0
3 years ago
Web page typically contains _______, which contains the formatting instructions for displaying the web pag
MatroZZZ [7]

The answer in the blank is HTML or also referred to as Hypertext Markup Language as this is always included with the World Wide Web pages for they are always essential and needed. It is because it is a standardized system that would help the resources of the internet that is to be displayed on the page.

6 0
3 years ago
Other questions:
  • What is cyber stalking and how does it work?
    7·2 answers
  • 40 points to answer ALL
    9·2 answers
  • Another problem related to indefinite postponement is called ________. This occurs when a waiting thread (letâ s call this threa
    7·1 answer
  • Which of the following statements isNOT true about abstract data types (ADTs)?A list is anexample of an ADT.ADTs hide theimpleme
    7·1 answer
  • What is it called when two different files generate the same hashing result?
    15·1 answer
  • What technology would you like to use or see developed that would help you be a "citizen of the world"?
    5·1 answer
  • In 2019, the tuition for a full time student is $7,180 per semester. The tuition will be going up for the next 7 years at a rate
    14·1 answer
  • What will happen if you reverse the connection of IDE?<br>​
    9·1 answer
  • RTOS stands for ______ Time Operating System.
    11·1 answer
  • Pls answer dis question when i'm not connected and i open bluestacks 5 it will be working but if i am connected it wil not work
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!