Which of the following statements about cryptography are true? Public-key encryp
ID: 3833582 • Letter: W
Question
Which of the following statements about cryptography are true? Public-key encryption is more efficient than shared key encryption, in the sense that information can be encrypted and decrypted faster. With shared key cryptography, the shared key can be published freely. With symmetric encryption, both the sender and the receiver need to know the secret key. A weakness with public-key encryption is that the public ket can only be used once. Using public-key cryptography, it is possible to check that the informationen really comes from the claimed sender.Explanation / Answer
1-public key encryption is more efficient than shared key encryption,in the sence that information can be encrypted and decrypted faser- Fasle though it is true that public key encryption is more efficient then shared key but it is true in the case of security issues but not the ancryption and decryption time.
2-With shared key cryptography, the shared key can pe published freely-False because this is done in public key cryptography in shared key cryptoography both sender and reciever share common key for encryption and decryption so if it gets published freely anyone can decrypt the message and then there is no se of envryption.
3-with symmetric encryption,both sender and reciever needs to know the secret key-True as this is the basis of this algorithm as both the parties uses same key for encryption and decryption so the key should be known to both the sender and the reciever.
4-A weaknesss with public key encryption is that public key can be used only once-False public key is published freely and it can be used N number of times for encryption of the message.
5-using public key crptography it is possible to check that information really comes from the claimed sender-false because for encryption any one can be the sender and can send message using the public key of the reciever but only reciever can decrypt the message using its private key so in this the sender is not garuantteed to be the claimed sender.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.