answersLogoWhite

0


Best Answer

2

User Avatar

Wiki User

9y ago
This answer is:
User Avatar
More answers
User Avatar

Anonymous

Lvl 1
4y ago

1

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is the minimum number of cryptographic keys required for secure two-way communications in asymmetric key cryptography?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

How is cryptography related to math?

Cryptography is the study of hiding information using mathematical algorithms in such a way that the original information cannot be assertained from the resulting 'cyphercode' without knowledge of the specific 'key' required to undo the changes made by the algorithm.The algorithms used in cryptography are related to math, being mathematically founded, and so, by extension, cryptography is related to math.


What is the difference between synchronous and asynchronous cryptography?

in synchronous communication data will be transmitted with clock and in asynchronous only start and stop bit is required for transmission of databut speed of the data transmission in synchronous is very high data rateand in asynchronous speed is slow due to the start and stop bit


What is the meaning of asymmetric encryption?

Asymmetric Encryption is a form of Encryption where keys come in pairs. What one key encrypts, only the other can decrypt. Frequently (but not necessarily), the keys are interchangeable, in the sense that if key A encrypts a message, then B can decrypt it, and if key B encrypts a message, then key A can decrypt it. While common, this property is not essential to asymmetric encryption. Asymmetric Encryption is also known as Public Key Cryptography, since users typically create a matching key pair, and make one public while keeping the other secret. Users can "sign" messages by encrypting them with their private keys. This is effective since any message recipient can verify that the user's public key can decrypt the message, and thus prove that the user's secret key was used to encrypt it. If the user's secret key is, in fact, secret, then it follows that the user, and not some impostor, really sent the message. Users can send secret messages by encrypting a message with the recipient's public key. In this case, only the intended recipient can decrypt the message, since only that user should have access to the required secret key. The key to successful use of Asymmetric Encryption is a Key Management system, which implements a Public Key Infrastructure. Without this, it is difficult to establish the reliability of public keys, or even to conveniently find suitable ones.


How many different keys will be required to give four people the ability to encrypt and decrypt the message using a symmetric cryptography algorithm?

ONEAnswer Explanation: Only one key would be required for everyone to be able to encrypt and decrypt the message. Symmetric cryptography uses the same "shared secret" key for encrypting and decrypting a message. A message encrypted using a symmetric encryption algorithm can be decrypted by anyone with the key. For this reason it is very important to ensure that the key is protected from unauthorized use. One of the primary security issues surrounding the use of symmetric cryptography is the method used to transport the key to users who need it, as most forms of communication are susceptible to eavesdropping.


What is New England School of Communications's average ACT score?

New England School of Communications in Maine offers test-optional for students, meaning prospective students are not required to take the SAT in order to be admitted.


What is New England School of Communications's average SAT score?

New England School of Communications in Maine offers test-optional admissions for students, meaning prospective students are not required to take the SAT in order to be admitted.


What skills are required to be a lawyer?

Business Programs; Communications, Journalism, reading, researching, analyzing, and thinking logically.note:all of these are important for a good lawyer!


Compare public key cryptography and Symmetric key cryptography?

In public key cryptography there are two parts: 1) secret part 2) public part ,in order for p1 to send p2 a message ,p1 first need to obtain p2's public key and using this key encrypts the message then p2 using his secret key decrypts the message. And in private key cryptograhy there is only one key so in order for p1 to send a message to p2, p1 should firstly ask p2 for his key then encrypt the message using that key and then p2 uses the same key to decrypt the message.


Which connection provides a secure CLI session with encryption to a Cisco switch?

To provide a secure CLI session with encryption to a Cisco switch an SSH or Secure Shell connection will be required as this uses a cryptographic network protocol that provides secure data communication.


What software would one need for business data communications and networking?

For business data communications and networking, the software that is required are Microsoft Office (including Microsoft Word, Microsoft PowerPoint and so on) and a networking software (various different brands).


What education do you need to become a college admissions consular?

I'm not an admissions counselor, but I know many of them have communications degrees. A degree may not be required, but you can always go farther in life if you have one. So if your dream is to be an admissions counselor, than I would get a communications degree!


Which key is used to encrypt data in an asymmetric encryption system?

This answer depends on who is sending the information in a secure manner. If confidentiality is required, then the public key of the receiver is used to encrypt the message. If integrity is desired then your private key would be used to encrypt the message.