Secrect Key System

11 Questions

Please wait...
Secrect Key System

Identify the process of the serect key

Questions and Answers
  • 1. 
    ___________________ is the traditional kind of cryptosystem
  • 2. 
    Symmetric key encryption uses __________ key,for both encryption and decryption.
  • 3. 
    The keys, in practice, represent a _____________ secret between two or more parties that can be used to maintain a private information link.
  • 4. 
    The algorithm used for symmetric key encryption is called ___________ algorithm.
  • 5. 
    The major vulnerability of secret-key algorithm is the need for _____________ the secret-key.
  • 6. 
    A cryptographic system that uses two keys -- a _____________known to everyone and a ____________ or secret key known only to the recipient of the message.
  • 7. 
     The __________ key can be used to encrypt messages.
  • 8. 
    The _____________ key can be used to decrypt them.
  • 9. 
    The public key system is an example of an _________________ key encryption.
  • 10. 
    The _________ keys are published in phone directories, Web pages and advertisements.
  • 11. 
    The same technology can be used in reverse, encrypt with a ____________ key and decrypt with a ___________ key.