Describe how public-key cryptography works today.

What will be an ideal response?

With public-key cryptography, two keys - called a key pair - are generated at the same time and are designed to work together. Public-key cryptography today works by encrypting a symmetric key with a public key and then decrypting the symmetric key with a private key. The connection, once made, exchanges encrypted data using symmetric encryption.
 

Computer Science & Information Technology

You might also like to view...

If Alex hires a new employee and the employee's account is provisioned after HR manually inputs information into the provisioning system based on data Alex provides via a series of forms, what type of provisioning has occurred?

A. Discretionary account provisioning B. Workflow-based account provisioning C. Automated account provisioning D. Self-service account provisioning

Computer Science & Information Technology

ISO details a model process for managing information security that comprises the following steps: plan, do, ________, and act.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology