I. Comprehend that symmetric encryption is also known as public-key encryption. II. Explain that symmetric encryption uses
Question:
I. Comprehend that symmetric encryption is also known as public-key encryption.
II. Explain that symmetric encryption uses a single key to encrypt and decrypt, but asymmetric encryption uses two different but related keys, one public and one private. For example, if Key A is used to encrypt the message, only Key B can decrypt it.
III. Differentiate the difference between a public key and a private key. Public keys are often stored in public locations whereas private keys are only known to the owner of the key pair.
IV. Classify asymmetric algorithms as one-way functions. This means they are simple to compute in one direction but complex to compute in the opposite direction.
V. Introduce students to the RSA algorithm, which is one of the most popular public-key cryptosystems.
VI. Criticize the understanding that with asymmetric encryption, four keys are required to hold a single conversation between two parties (two public and two related private keys). The more parties that are involved in a conversation, the exponential rise of the number of keys required to be managed.
Step by Step Answer:
Principles Of Information Security
ISBN: 9780357506431
7th Edition
Authors: Michael E. Whitman, Herbert J. Mattord