Describe symmetric encryption. What is the weakness of this type of encryption?
What will be an ideal response?
Each of the aforementioned encryption and decryption methods requires the same algorithm and key-a secret key-to be used to both encipher and decipher the message. This is known as private key encryption, or symmetric encryption. Symmetric encryption is efficient and easy to process, as long as both the sender and the receiver possess the encryption key. Of course, if either copy of the key becomes compromised, an intermediary can decrypt and read the messages. One challenge in symmetric key encryption is getting a copy of the key to the receiver, a process that must be conducted out-of- band (that is, through a channel or band different from the one carrying the ciphertext) to avoid interception.
You might also like to view...
Charts represent tables of data ________
Fill in the blank(s) with correct word
Case-Based Critical Thinking QuestionsCase 15-1Tom is taking a class on computer graphics and how to use them. Tom needs a picture of his college dorm room for a project that he has just been assigned. The easiest way for Tom to get a picture of his dorm room onto his computer is to ____.
A. take a picture of the room with a film camera, take the film to be developed, and then scan the image into his computer B. take the picture with a digital camera and plug the camera into his computer C. search the Internet to see if any of his friends have a picture of his room online D. use a Polaroid camera and tape the picture to his monitor