Encryption has a remarkably long and varied history.Spies have been using it to convey secret messages ever since there were secret messages to convey.One powerful method of encryption uses random digits.Two documents are prepared with the same random sequence of numbers.The spy is sent out with one and the spy master retains the other.The digits are used as follows.Suppose that the word to be encrypted is SPY and the random digits are 352.Then S becomes V (three letters after S) ,P becomes U (five letters after P) ,and Y becomes A (two letters after Y,restarting at A after Z) .The spy would encrypt a message and then destroy the document used to encrypt it.This is an early example of
A) a hashing algorithm.
B) asymmetric key encryption.
C) symmetric key encryption.
D) public key encryption.
Correct Answer:
Verified
Q40: If an organization asks you to disclose
Q41: Describe symmetric encryption and identify three limitations.
Q42: Encryption has a remarkably long and varied
Q43: Which of the following is not one
Q44: In a private key system the sender
Q46: Information encrypted with the creator's private key
Q47: You are assisting a manager from your
Q48: Which systems use the same key to
Q49: _ are used to create digital signatures.
A)Asymmetric
Q50: Asymmetric key encryption combined with the information
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents