answersLogoWhite

0


Best Answer

Any shared private key method - symmetric encryption.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

11y ago

Symmetrical Key Cryptography. Both parties encrypt and decrypt with the same secret. Also called "Previous Shared Secret" Encryption

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What encryption requires both sides of an encrypted conversation to use an encrypted key to be able to encode and decode the data?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

An attacker has managed to decode the encrypted messages of a wireless network the network uses windows xp and cisco equipment the security protocol that is used is wep with 64-bit encryption which?

You need to choose stronger encryption and longer encryption key.


What is an antonym for encryption?

decode


An attacker has managed to decode the encrypted messages of a wireless network the network uses windows xp and cisco equipment the security protocol that is used is wep with 64-bit encryption?

Upgrade to the LEAP wireless security protocol.


What is the process of encoding information in a way so that only someone with a key can decode it?

Encryption is the answer


The receiver will be able to decode the message if the transmitter and receiver share the same?

traffic encryption key


16 What was the Colossus computer created to decode?

The Colossus was created to decode encrypted messages from Germany during World War Two using the infamous "Enigma" machine. For full rundown see Simon Singh's "The Code Book".


What did they use the first computer for?

The first proper computers were used to help the Allies decode German encrypted messages during World War II.


I need help decoding a message!Code: ".- --- -... ---.. -.-- -.-. .-. ---.."?

It is: A C B 8 YKK 8.


How can I decode a secret message in a PNG?

You will have to know the encryption algorithm and the key used. If you do not know these you will need to use cryptanalysis to "crack" it. This is not easy (obviously).


Does modern cryptography inherit old cryptography?

Yes, the basic underlying concept is still same . First encryption is done and then to decode the original text decryption is done..


What is a Xor cypher used for?

XOR cipher is a form of encryption algorithm. In simple terms, the cipher is used to decode binary language. For more details, Wikipedia is a great resource.


Which type of encryption technology uses two keys to encrypt and decrypt data?

If the keys are different, then it is asymmetrical. If it is the same key used twice to encode and decode; then it is symmetrical.