Question

In: Computer Science

When sending a large set of files, would you use symmetric key encryption or asymmetric key...

  1. When sending a large set of files, would you use symmetric key encryption or asymmetric key encryption? Why?

  2. What is the disadvantage of using a one-time pad cipher?

  3. Why are computer racks often not fully equipped?

  4. What is the difference between a back-out and a brownout?

Solutions

Expert Solution

Solution:-

Symmentric key encryption uses a single key that needs to be shared among the people who needs to recive the message.While asymmetric key uses pair of public key and private key to encrypt and decrypt the message.

1)Answer:-

They asked that in seding a large set of file then which encyption will use symmetric key or asymmetric key.

So considering the above question i use asymmetric key encryption.Becuase asymmetric key encryption is more secure than symmetric key encruption.When message is encrypt using public key it can only decrypt by using private key.However the message is can encrypt using public key,it can only be decrypt using private key.In asymmetric key encryption there are two keys private key and public key.the reciver first transmit the public key to the sender.the sender uses piblic key to encrypt the message.The reciver decrypt the message using private key.

2)Answer:-

Computer racks often not fully equipped becuase all computers have not the same size and we canot fit our computer in any of the rack.Different company made computer in different structrure.some time company makes the self rack for computer.so thats why computers racks not fully equipped.

Disadvantage of One time pad cipher:-A disadvantage of the one time pad is that the key is as long as the message and it too must be transmitted security to the recipent before the message can be send another disadvantage is the to generate random key for cipher.

3)Answer:-

4)Answer:-

A brownout is partial,temporary reduction in total system capacity while blackout is complete interruption in power.Blackout is that a brownout is used by an energy provider as an emergency strategy to prevent the system from blackout. A brownout is an intentional or unintentional drop or sag,in voltage in an encrypt grid.It occures in heavy load times.


Related Solutions

You are building a safe messaging system by using an Encryption such as private key (symmetric)...
You are building a safe messaging system by using an Encryption such as private key (symmetric) and public key (Asymmetric) that would prevent the utility company from knowing the content of the communications being exchanged. The receiver can be disconnected and cannot receive messages, how can this situation be managed by your system?
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. Say we have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Alice and Bob.
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. Say we have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Alice and Bob.
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. Say we have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Jane and Karl.
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. We have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Alice and Bob. Include a diagram.
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. Say we have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Jane and Karl. Show and explain every step involved.
What is the difference between symmetric competition and asymmetric competition? How would you expect species to...
What is the difference between symmetric competition and asymmetric competition? How would you expect species to react, adapt and evolve in response to each type of competition?
When would you choose to use containers in Windows and when would you choose to use...
When would you choose to use containers in Windows and when would you choose to use containers in Linux? How are they different? How are they similar?
Question 5: How public key encryption is used to ensure confidentiality of a message. Use a...
Question 5: How public key encryption is used to ensure confidentiality of a message. Use a diagram to explain.
1. In terms of security, why would you not use rm command to delete files? 2....
1. In terms of security, why would you not use rm command to delete files? 2. Shred and dd are tools used to securely delete files. Which is the best tool for securely deleting a file from a system and why? Consider the limitations of each tool when choosing your answer. 3. What encryption is used to encrypt HTTP traffic (HTTPS)? 4. The CIA triad , confidentiality, integrity, and availability represent the three goals for cybersecurity. Which goal(s) does/do encryption...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT