answersLogoWhite

0

111

User Avatar

Wiki User

12y ago

What else can I help you with?

Related Questions

How can you decrypt an encrypted mp3?

Apply the encryption key to the file.


How do you decrypt a data file to that has been encrypted with the users public key?

When you reference a "public key" you are implying that the file has been encrypted using "asymmetric cryptography". In asymmetric cryptography, encryption and decryption depend on a key PAIR. The user retains their private key and publishes their public key. Anyone can encrypt a file using the user's public key and send it to them. The only person who should be able to decrypt a file encrypted with that public key is the holder of the private key - which, unless the user has made the mistake of sharing their private key - means that only the original user can decrypt the messages sent to them. Most of the asymmetric encryption algorithms use pretty much the same method to decrypt that was used to encrypt, but use the "other" key from the key pair. Messages encrypted using the private key can only be decrypted using the public key - which provides some authentication that the message indeed came from the holder of the private key. Messages encrypted using the public key can only be decrypted by the holder of the private key, so messages sent to them should be secure.


What is a password-protected and encrypted file that holds an individual's identification and information including a public key?

digital certificate


What is a password protected and encrypted file that holds an individual's identification and information including a public key?

digital certificate


What happens when an authorised user tries to unencrypt a file?

The system software or third party software validates the authorization (the security token for the current account), and then decrypts a key that is tied to the user's account using the supplied password, and then applies that key to the file's contents, ultimately decrypting the file. The key is encrypted with the user's password, and can not be decrypted without this password. For this reason, using the "reset password" function without supplying their old password will render all of their encrypted files unrecoverable. This can be prevented by having an account designated as a recovery agent, or by backing up the keys to a server or disk.


How disable the function key on a computer keyboard?

peso sign


What is the easiest way to give others access to a file that you have encrypted?

Encrypt ur data by ur private key ....and give the public key to ur private key to the entitled person .....whom u want to give the data....!!


What is the easiest way to give other access to a file that you have encrypted?

Encrypt ur data by ur private key ....and give the public key to ur private key to the entitled person .....whom u want to give the data....!!


What is a characteristic of public key cryptography?

If data is encrypted with the public key, only the private key can decrypt itAnswer Explanation: Public key encryption uses an asymmetric algorithm, which uses a public key and private key combination for the encryption and decryption process. If data is encrypted with the public key, only the private key can decrypt the data. The public key cannot decrypt a message that was encrypted with the public key. Alternatively, if data is encrypted with the private key, only the public key can decrypt the data.


How do you unlock bit locker encrypted drive lost the password and the recovery key also?

Sorry; there is no way to recover BitLocker encrypted data if you have lost both the password and the recovery key.


What are characteristics of public key cryptography?

If data is encrypted with public key, only private key can decrypt it. AGN


What are two drawbacks to using wep shared key encryption?

Encrypted networks work slower (sometimes not much, sometimes a lot) than not encrypted.