1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena-14-01-66 [18.8K]
2 years ago
15

100 POINTS!!!!!!

Computers and Technology
1 answer:
Veronika [31]2 years ago
3 0

Answer:

The fundamental limitation of symmetric (secret key) encryption is ... how do two parties (we may as well assume they are Alice and Bob) agree on a key? In order for Alice and Bob to communicate securely they need to agree on a secret key. In order to agree on a secret key, they need to be able to communicate securely. In terms of the pillars of IA, To provide CONFIDENTIALITY, a secret key must first be shared. But to initially share the key, you must already have CONFIDENTIALITY. It's a whole chicken-and-egg problem.

This problem is especially common in the digital age. We constantly end up at websites with whom we decide we want to communicate securely (like online stores) but with whom we there is not really an option to communicate "offline" to agree on some kind of secret key. In fact, it's usually all done automatically browser-to-server, and for the browser and server there's not even a concept of "offline" — they only exist online. We need to be able to establish secure communications over an insecure channel. Symmetric (secret key) encryption can't do this for us.

Asymmetric (Public-key) Encryption

Yet one more reason I'm barred from speaking at crypto conferences.

xkcd.com/177/In asymmetric (public key) cryptography, both communicating parties (i.e. both Alice and Bob) have two keys of their own — just to be clear, that's four keys total. Each party has their own public key, which they share with the world, and their own private key which they ... well, which they keep private, of course but, more than that, which they keep as a closely guarded secret. The magic of public key cryptography is that a message encrypted with the public key can only be decrypted with the private key. Alice will encrypt her message with Bob's public key, and even though Eve knows she used Bob's public key, and even though Eve knows Bob's public key herself, she is unable to decrypt the message. Only Bob, using his secret key, can decrypt the message ... assuming he's kept it secret, of course.

Explanation:

You might be interested in
What type of software can you run to help fix computer problems?
GarryVolchara [31]

Answer:

IOBit Driver Booster.

Explanation:

3 0
3 years ago
Read 2 more answers
C++
Cerrena [4.2K]

Answer:

#include <iostream>

#include<iomanip>

using namespace std;

double DrivingCost(double drivenMiles, double milesPerGallon, double dollarsPerGallon)

{

  double dollarCost = 0;

  dollarCost = (dollarsPerGallon * drivenMiles) / milesPerGallon;

  return dollarCost;

}

int main()

{

  double miles = 0;

  double dollars = 0;

  cout << "Enter miles per Gallon   : ";

  cin >> miles;

  cout << "Enter dollars per Gallon: ";

  cin >> dollars;

  cout << fixed << setprecision(2);

  cout << endl;

  cout << "Gas cost for 10 miles : " << DrivingCost(10, miles, dollars) << endl;

  cout << "Gas cost for 50 miles : " <<DrivingCost(50, miles, dollars) << endl;

  cout << "Gas cost for 400 miles: "<<DrivingCost(400, miles, dollars) << endl;

  return 0;

}

Explanation:

  • Create a method definition of DrivingCost that accepts  three input double data type parameters drivenMiles,  milesPerGallon, and dollarsPerGallon and returns  the dollar cost to drive those miles .
  • Calculate total dollar cost and store in the variable, dollarCost .
  • Prompt and read the miles and dollars per gallon  as input from the user .
  • Call the DrivingCost function three times  for the output to the gas cost for 10 miles,  50 miles, and 400 miles.

 

4 0
3 years ago
Read 2 more answers
What is the purpose of using a good e-mail technique?. Demonstrate your ability to write good e-mails b. Completely describe you
densk [106]
B. Completely describe your entire thought process
3 0
3 years ago
In a penetration test, the ________ team comprises testers who are given no knowledge of the infrastructure and are attacking a
just olya [345]

Answer:

TIGER TEAM

Explanation:

Penetration testing is the act of simulating an attack on an organization's resources to assess an infrastructure's true vulnerabilities. A penetration test simulates an actual attack. Penetration testers use a variety of methods including social engineering, software hacking and physical intrusion.

There are different types of penetration testing teams which are: red team, blue team and purple team.

Red team also known as the tiger team simulates real types of cyber attacks in order to discover any unknown security vulnerabilities or weaknesses.

In penetration testing, tiger (red) team are the attackers and are usually outside contractors, with a lot of knowledge of how to break in but NO KNOWLEDGE OF WHAT SECURITY IS IN PLACE.

Therefore, In a penetration test, the TIGER TEAM comprises testers who are given no knowledge of the infrastructure and are attacking a target that is unaware of their existence until the attack is made.

3 0
3 years ago
Which process refers to starting up a computer?
alekssr [168]
The process of Starting up a computer is referred to as booting
5 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is the best definition of a workplace policy?
    13·2 answers
  • A(n ____ is anything about which data are to be collected and stored.
    8·1 answer
  • Sulfur content is measured in
    11·1 answer
  • Primary U.S. interstate highways are numbered 1-99. Odd numbers (like the 5 or 95) go north/south, and evens (like the 10 or 90)
    5·1 answer
  • Question 2 of 3
    7·2 answers
  • Help I need the code for In and out Milky Way in CoderZ
    6·1 answer
  • Consider the method get Hours, which is intended to calculate the number of hours that a vehicle takes to travel between two mil
    6·1 answer
  • The code on the side is a software solution to the mutual exclusion problem for two processes. It shares two variables:
    11·1 answer
  • Create a multimedia project that contains the text element and all the contents that you have studied about that element
    13·1 answer
  • Consider the following code snippet that appears in a subclass: public void deposit(double amount) { transactionCount ++; deposi
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!