When there is no shared secret and large quantities of sensitive information must be passed, it is more efficient to use a hybrid encryption technique to transfer information. What does this mean?

A. Use of the recipient's public key for encryption and decryption based on the
recipient's private key
B. Use of public key encryption to secure a secret key, and message encryption
using the secret key
C. Use of software encryption assisted by a hardware encryption accelerator
D. Use of elliptic curve encryption

B. Use of public key encryption to secure a secret key, and message encryption
using the secret key

Computer Science & Information Technology

You might also like to view...

A ________ is text that helps to identify or explain a picture or graphic

A) caption B) title C) descriptor D) label

Computer Science & Information Technology

Here is a collection of if and if-else statements with semicolons in various places. Assume all variables have been declared and initialized. Which of these are correct and are likely to give the programmers intent? Which are correct but unlikely to give the programmer's intent? Give the error for the remaining.

a) ``` if ( a > b ); a = b; else b = a; ``` b) ``` if(a > b ) a = b; else; b = a; ``` c) ``` if(a > b ) a = b; else b = a; ``` d) ``` if(a > b) a = b else b = a; ``` e) ``` if( x !=0 ) a = a / x ```

Computer Science & Information Technology