Alice is designing a cryptosystem for use by six users and would like to use a symmetric encryption algorithm. She wants any two users to be able to communicate with each other without worrying about eavesdropping by a third user. How many symmetric encryption keys will she need to generate?
A. 6
B. 12
C. 15
D. 30
Answer: C. 15
Computer Science & Information Technology
You might also like to view...
The best way to review two different documents containing revisions, based from the original document, is to use ________
A) Compare B) Contrast C) View Side by Side D) Combine
Computer Science & Information Technology
What is the role of a “controller” in Figure 1.8?
What will be an ideal response?
Computer Science & Information Technology