Alice is designing a cryptosystem for use by six users and would like to use a symmetric encryption algorithm. She wants any two users to be able to communicate with each other without worrying about eavesdropping by a third user. How many symmetric encryption keys will she need to generate?

A. 6
B. 12
C. 15
D. 30

Answer: C. 15

Computer Science & Information Technology

You might also like to view...

The best way to review two different documents containing revisions, based from the original document, is to use ________

A) Compare B) Contrast C) View Side by Side D) Combine

Computer Science & Information Technology

What is the role of a “controller” in Figure 1.8?

What will be an ideal response?

Computer Science & Information Technology