Show
Navbar Search Filter Mobile Microsite Search Term Search
You do not currently have access to this chapter. PurchaseOur books are available by subscription or purchase to libraries and institutions. Purchasing information Which term is used to describe the resulting text that is encrypted?Ciphertext is encrypted text transformed from plaintext using an encryption algorithm. Ciphertext can't be read until it has been converted into plaintext (decrypted) with a key.
What is the term used in cryptography when the same key is used to encrypt and decrypt the data?Symmetric encryption uses the same key to perform both encryption and decryption functions. Symmetric encryption uses a shared private key while asymmetric encryption uses a public/private key pair. Another difference between asymmetric and symmetric encryption is the length of the keys.
What is the term used to describe a cryptographic method that incorporates?Asymmetric Encryption or Public Key Encryption. A cryptographic method that incorporates mathematical operations involving both a public key and a private key to encipher or decipher a message. Either key can be used to encrypt a message, but then the other key is required to decrypt it.
Which of the following is the term given to the process of encrypting a message one byte or one bit at a time as it is transmitted?A stream cipher is a method of encrypting text (to produce ciphertext) in which a cryptographic key and algorithm are applied to each binary digit in a data stream, one bit at a time.
|