1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena-14-01-66 [18.8K]
2 years ago
15

100 POINTS!!!!!!

Computers and Technology
1 answer:
Veronika [31]2 years ago
3 0

Answer:

The fundamental limitation of symmetric (secret key) encryption is ... how do two parties (we may as well assume they are Alice and Bob) agree on a key? In order for Alice and Bob to communicate securely they need to agree on a secret key. In order to agree on a secret key, they need to be able to communicate securely. In terms of the pillars of IA, To provide CONFIDENTIALITY, a secret key must first be shared. But to initially share the key, you must already have CONFIDENTIALITY. It's a whole chicken-and-egg problem.

This problem is especially common in the digital age. We constantly end up at websites with whom we decide we want to communicate securely (like online stores) but with whom we there is not really an option to communicate "offline" to agree on some kind of secret key. In fact, it's usually all done automatically browser-to-server, and for the browser and server there's not even a concept of "offline" — they only exist online. We need to be able to establish secure communications over an insecure channel. Symmetric (secret key) encryption can't do this for us.

Asymmetric (Public-key) Encryption

Yet one more reason I'm barred from speaking at crypto conferences.

xkcd.com/177/In asymmetric (public key) cryptography, both communicating parties (i.e. both Alice and Bob) have two keys of their own — just to be clear, that's four keys total. Each party has their own public key, which they share with the world, and their own private key which they ... well, which they keep private, of course but, more than that, which they keep as a closely guarded secret. The magic of public key cryptography is that a message encrypted with the public key can only be decrypted with the private key. Alice will encrypt her message with Bob's public key, and even though Eve knows she used Bob's public key, and even though Eve knows Bob's public key herself, she is unable to decrypt the message. Only Bob, using his secret key, can decrypt the message ... assuming he's kept it secret, of course.

Explanation:

You might be interested in
when using presentation software, which menu can you use to duplicate a slide to use as a template for a new slide?
miskamm [114]


<span>Open two presentations.<span><span>original presentation - contains the slides to copy from</span><span>destination presentation - slides will be copied to this presentation - (this may be an existing presentation or a new presentation)
 <span><span>For PowerPoint 2007 - On the View tab of the ribbon, in the Window section, click on the Arrange All button.</span><span> - Choose Window > Arrange All from the main menu.</span></span></span></span>This will show both presentations at the same time on screen.

</span><span><span>For all versions of PowerPoint, choose one of the following methods to copy your slides ~<span><span>Copy and Paste<span><span>Right click on the thumbnail slide to be copied, in the Slides/Outline task pane of the original presentation.</span><span>Choose Copy from the shortcut menu.</span>In the destination presentation, right click in a blank area of the Slides/Outline task pane, where you wish to place the copied slide. This can be anywhere in the sequence of slides in the
presentation.<span>Choose Paste from the shortcut menu.</span></span></span><span>Click and Drag<span>In the Slides/Outline task pane of the original presentation, click on the thumbnail version of the desired slide.<span>Drag the thumbnail slide to the Slides/Outline task pane of the destination presentation in the preferred location for the slide.</span></span></span></span></span><span>The newly copied slide will take on the design theme or design template of the second presentation. If you have started a new presentation and have not applied a design theme or design template, the newly copied slide will be on the white background of the default design template.</span></span>
6 0
3 years ago
Write a program to input a number.Find the sum of digits and number of digits
ki77a [65]

omg a computer program

i love it

okay so i will assume taht you want the program to be in python

here we go

a = int(input("Enter a number ")

b = int(input("Enter another number ")

sum = a + b

def Digits(sum):

count = 0

while sum != 0:

sum //= 0

count += 1

return count

print(f"Sum is {sum} \nnumber of digits are {Digits(sum)}")

7 0
3 years ago
Read 2 more answers
What type of engineer works on cleaning up oil spills?
Margaret [11]

your answer is b. i know this because oil is a chemical.

7 0
3 years ago
Read 2 more answers
How do you make the "Colorize" feature in GIMP consistent if you cannot connect the different places? Brainliest if you also exp
Brums [2.3K]

Ah, that's easy. You have to select certain parts by using the Free Select tool. Use colorize. Then select the next part and use colorize, but choose the latest used PRESET color to be consistent.

To cut out parts of the image, duplicate your layer without colorization and colorize the top layer. If you have already colorized, put the duplicate as the top layer and click Base Image on the edit history for your original, which is the bottom layer. Use Free Select then click Scissor Select and press the delete button on your keyboard to remove an area, then switch from top layer to bottom layer and use colorize.

6 0
3 years ago
Read 2 more answers
A lever has an effort arm that is 8 meters long and the residence (load) arm that is 1.5 meters long, how much effort is needed
andrew11 [14]

Answer:

1066.67 N

Explanation:

Given that two measurements of the arm and an input weight. To answer this problem,we need to balance the forces and use the lengths of the arms. 

Force × effort of arm distance= input weight × load distance

200 N * 8 m = x * 1.5 m

1600 = 1.5x

x = 1600/1.5

x = 1066.666 N

it takes 1066.67 N to lift the input weight

4 0
3 years ago
Other questions:
  • "Which of the following will help protect against a brute force attack?
    11·1 answer
  • Discuss anomaly detection.
    5·1 answer
  • What is an activity that can help you enhance the appearance of your computer’s desktop?
    13·1 answer
  • 12. When trying to identify the sorted column in a table, you would look for the column where A. an arrow is displayed in the fi
    10·2 answers
  • When you make taffy (a pliable candy), you must heat the candy mixture to 270 degrees Fahrenheit.
    8·1 answer
  • Use the drop-down menus to complete each sentence about the layers of the atmosphere.
    14·2 answers
  • Write a program that accepts the lengths of three sides of a triangle as an input from the user: A, B, C
    13·1 answer
  • Write an algorithm to show whether a given number is even or odd.
    14·1 answer
  • I WILL GIVS BRAINLIEST IF U ANSWER THIS
    9·1 answer
  • Which version of java should i use?.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!