Select from following answers:- Encrypted data is transmitted and then decrypted, and you want to ensure that a malicious user cannot use a transmitted key to decrypt.
- The application must minimize computational processing.
- The application will encrypt up to 1 Mb of data at a time.
- All Above
If encrypted data is transmitted and then decrypted and you want to ensure that a malicious user cannot use a transmitted key to decrypt, you should use public-key encryption.
Public-key encryption uses a private key that must be kept secret from unauthorized users and a public key that can be made public to anyone. The public key and the private key are mathematically linked; data that is encrypted with the public key can be decrypted only with the private key, and data that is signed with the private key can be verified only with the public key.
The public key can be made available to anyone; it is used for encrypting data to be sent to the keeper of the private key.
Show Correct Answer
Source: Measureup.com | |
Alert Moderator