1.
Share a common key for encryption and decryption.
Correct Answer
A. Symmetrical
Explanation
Symmetrical encryption, also known as secret key encryption, uses the same key for both encryption and decryption processes. This means that the sender and receiver must share a common key to encrypt and decrypt the message. It is a fast and efficient method of encryption, suitable for secure communication between two parties who already have a shared secret key. However, the challenge lies in securely distributing and managing the key, as any compromise of the key would compromise the security of the communication.
2.
Faster and uses less processing resources.
Correct Answer
A. Symmetrical
Explanation
Symmetrical systems are designed to be balanced and equal in terms of processing resources, resulting in faster and more efficient performance. This means that the workload is evenly distributed across all components, allowing for optimal utilization of resources. Asymmetrical systems, on the other hand, may have imbalances in resource allocation, leading to slower processing and potentially wasteful use of resources. Therefore, the given answer correctly states that a symmetrical system is faster and uses less processing resources.
3.
Key management can be a issue as the number of users increases.
Correct Answer
A. Symmetrical
Explanation
Symmetrical key management can become a challenge as the number of users increases. In symmetrical encryption, the same key is used for both encryption and decryption. This means that every user needs to have a copy of the same key in order to encrypt and decrypt messages. As the number of users grows, distributing and managing the same key for all of them becomes more difficult and poses a security risk. Asymmetrical encryption, on the other hand, uses different keys for encryption and decryption, which simplifies key management as each user has their own unique key pair.
4.
Uses RSA (Rivest-Shamir-Adleman).
Correct Answer
B. Asymmetrical
Explanation
The given correct answer is "Asymmetrical." Asymmetrical encryption, also known as public-key encryption, uses a pair of keys - a public key for encryption and a private key for decryption. This type of encryption is more secure as it eliminates the need for sharing a single key between the sender and receiver. RSA (Rivest-Shamir-Adleman) is a commonly used algorithm for asymmetrical encryption.
5.
Used by applications like IKE, SSH, PGP and SSL.
Correct Answer
B. Asymmetrical
Explanation
The correct answer is asymmetrical because applications like IKE, SSH, PGP, and SSL use asymmetric encryption algorithms. Asymmetric encryption involves the use of a pair of keys, a public key and a private key, to encrypt and decrypt data. The public key is widely distributed and used for encryption, while the private key is kept secret and used for decryption. This type of encryption is often used for secure communication and authentication purposes.
6.
Use a public key to encrypt and private key to decrypt.
Correct Answer
B. Asymmetrical
Explanation
The correct answer is asymmetrical because in asymmetrical encryption, a public key is used to encrypt the data, while a private key is used to decrypt it. This type of encryption is also known as public-key encryption and is widely used in secure communication systems. The use of different keys for encryption and decryption ensures that the data remains secure, as the private key is kept secret and only the intended recipient can decrypt the encrypted data using their private key.