What are the advantages & disadvantages of public key encryption?

1 Answer

Answer :

Advantages:  
a) Remove the restriction of a shared secret key between two entities. Here each entity can create a  pair of keys, keep the private one, and publicly distribute the other one.  
b) The no. of keys needed is reduced tremendously. For one million users to communicate, only  two million keys are needed.  
Disadvantage:  
Calculating the cipher text using the long keys takes a lot of time. So it is not recommended for  large amounts of text.

Related questions

Description : Encryption of data is important to ensure its privacy. It is most commonly achieved by using a ____. A. public-key encryption B. private-key encryption C. password-key encryption D. character set encryption

Last Answer : A. public-key encryption

Description : What checks out your computer or network for potential weaknesses? a. Encryption b. Public key encryption c. Security‐auditing software d. None of the above

Last Answer : c. Security‐auditing software

Description : What looks for people on the network who shouldn't be there or who are acting suspiciously? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software

Last Answer : c. Intrusion‐detection software

Description : What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software

Last Answer : b. Public key encryption

Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private

Last Answer : d. public, private

Description : While sending a signed message, a sender a. sends message key using public key encryption using DES and hashed message using public key encryption b. sends message using public key encryption ... and hashed message using DES d. sends both message and hashed message using public key encryption

Last Answer : a. sends message key using public key encryption using DES and hashed message using public key encryption  

Description : In public key encryption system if A encrypts a message using his private key and sends it to B a. if B knows it is from A he can decrypt it using A's public key b. Even if B knows who sent the ... be decrypted at all as no one knows A's private key d. A should send his public key with the message

Last Answer : a. if B knows it is from A he can decrypt it using A’s public key 

Description : In public key encryption if A wants to send an encrypted message a. A encrypts message using his private key b. A encrypts message using B’s private key c. A encrypts message using B’s public key d. A encrypts message using his public key  

Last Answer : c. A encrypts message using B’s public key 

Description : Public key encryption method is a system a. which uses a set of public keys one for each participant in e-Commerce b. in which each person who wants to communicate has two keys; a private key known to him ... him. c. which uses the RSA coding system. d. which is a standard for use in e-Commerce.  

Last Answer : b. in which each person who wants to communicate has two keys; a private key known to him only and a public key which is publicized to enable others to send message to him.

Description : Triple DES a. is a symmetric key encryption method b. guarantees excellent security c. is implementable as a hardware VLSI chip d. is public key encryption method with three keys. 

Last Answer : b. guarantees excellent security  

Description : DES (i) is a symmetric key encryption method (ii)guarantees absolute security (iii) is implementable as hardware VLSI chip (iv) is a public key encryption method a. i and ii b. ii and iii c. i and iii d. iii and iv

Last Answer : c. i and iii 

Description : By symmetric key encryption we mean a. one private key is used for both encryption and decryption b. private and public key used are symmetric c. only public keys are used for encryption d. only symmetric key is used for encryption

Last Answer : D

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : Data encryption techniquesare particularly useful for A. reducingstorage space requirements B. improving data integrity C. protecting data indata communication systems D. All of theabove E. None of the above

Last Answer : protecting data indata communication systems

Description : Modulation is theprocessof A. converting analogsignals todigital signals B. converting digital signals toanalog signals C. Multiplexing various signals intohigh speed line signals D. performing data encryption

Last Answer : converting digital signals toanalog signals

Description : What occurs in the session layer? a.Data compression and encryption b.MAC address are handled c.binary to decimal conversion d.sessions are created

Last Answer : d.sessions are created

Description : Encryption and decryption are functions of which layer? a. transport b. session c. application d. presentation

Last Answer : d. presentation

Description : The functionalities of the presentation layer include ____________ a. Data compression b. Data encryption c. Data description d. All of the mentioned

Last Answer : d. All of the mentioned

Description : The functionalities of the presentation layer include ____________ a. Data compression b. Data encryption c. Data description d. All of the mentioned

Last Answer : d. All of the mentioned

Description : NAT limits the use of ………………….. and ……………… A. encryption, authentication. B. encryption, decryption C. encapsulation, translation D. authentication, verification

Last Answer : A. encryption, authentication.

Description : The _______ is used to provide integrity check, authentication, and encryption to IP datagram’s. A. UDP B. Transport layer C. ESP D. SSL

Last Answer : C. ESP

Description : The functionalities of the presentation layer include ____________ a) Data compression b) Data encryption c) Data description d) All of the mentioned

Last Answer : d) All of the mentioned

Description : Transmission media are usually categorized as . a. Guided or Unguided b. Determinate or Indeterminate c. Fixed or Unfixed d. Encryption or Decryption

Last Answer : a. Guided or Unguided

Description : USB Key Encryption: How?

Last Answer : I don’t recall how. But I am pretty sure you can run TrueCrypt from the USB drive. Google for it. You should find something.

Description : Symmetric key cryptography was the only kind of encryption publicly known until: a) July 195 b) June, 1976 c) June 1988 d) None of These

Last Answer : b) June, 1976

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : Symmetric key cryptography was the only kind of encryption publicly known until: a) July 195 b) June, 1976 c) June 1988 d) None of These

Last Answer : b) June, 1976

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : A portion of the Polymorphic virus, generally called a …………………….. , creates, a random encryption, key to encrypt the remainder of the virus. A) mutual engine B) mutation engine C) multiple engine D) polymorphic engine

Last Answer : C) multiple engine

Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above

Last Answer : a. Encryption

Description : If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be: (A) N (B) (N-1) (C) N(N-1)/2 (D) N(N+1)/2

Last Answer : (C) N(N-1)/2 

Description : What are the advantages and disadvantages of a private versus public school education?

Last Answer : Do you mean college, or are you referring to elementary or high school aged children? If you are talking about the younger folks, I have had both the public and private experience: public school for ... don't have to pay a lot to get a good education, but private school has its benefits.

Description : Explain the Mendeleev’s Law of classification of elements also describe advantages & disadvantages of his periodic table.

Last Answer : Ans : Mendeleeve's Law of Classification : Mendeleeve in 1869 arrange elements in order of increasing atomic masses. He placed chemically similar elements vertically beneath each other & concluded that : The ... metals. No Idea Of Atomic Structure : It failed to give the idea of atomic structure.

Description : Write the advantages & disadvantages of an evaporating pan

Last Answer : Advantages:   It is simple and cheap to construction.   Easy to clean and maintain.   Economical.  Disadvantages:   Poor coefficient of heat transfer.   Heating surface is ... concentration of thermolabile material.   Evaporating pan is open so vapour cause discomfort to the worker.

Description : State advantages & disadvantages of electromagnetic flow meter.

Last Answer : Advantage: Provides wide linear range. 2) Ability to measure reverses flow. 3) Gives rapid response to flow changes. 4) No obstruction is created to flow. 5) It can handle corrosive as ... and pipe networks with relatively short inside diameters. 3) It is useful for electrically conducting fluid.

Description : It is powered by ______ encryption tools a) WEP WPA & WPA2 b) WEP c) WPA d) None of these

Last Answer : a) WEP WPA & WPA2

Description : The primary advantage of key-to-tape data entry system is a. A large percentage of editing can be performed at the time of data entry b. Key verification is easily performed c. The tape is reusable d. Keying errors can be detected as they occur

Last Answer : The tape is reusable

Description : The physical location of arecord isdetermined bya mathematical formula that transforms a file key into a record location in A. a tree file B. an indexed file C. a hashedfile D. a sequential file E. None of the above

Last Answer : a hashedfile

Description : The computer abbreviation KB usually means– (A) Key Block (B) Kernel Boot (C) Key Byte (D) Kit Bit (E) Kilo Byte

Last Answer : Kilo Byte

Description : The“““.enables you tosimultaneously keep multiple Web pagesopen in onebrowser window. (A) tab box (B) pop-up helper (C) tab row (D) addressbar (E) Esc key

Last Answer : tab row

Description : In Wordyou canforce a page break– (A) By positioning your cursor at theappropriate place and pressing the F1 key (B) By positioning your cursor at theappropriate place and pressing Ctrl+Enter (C) By using the Insert/Section Break (D) By changing thefont sizeof yourdocument (E) None of these

Last Answer : By positioning your cursor at theappropriate place and pressing Ctrl+Enter

Description : The Caesar cipher is a _______cipher that has a key of 3. A. transposition B. killer C. shift D. none of the above

Last Answer : C. shift

Description : Though local search algorithms are not systematic, key advantages would include __________ a) Less memory b) More time c) Finds a solution in large infinite space d) Less memory & Finds a solution in large infinite space

Last Answer : d) Less memory & Finds a solution in large infinite space

Description : What is the disadvantages and advantages of circulatory system of mammal?

Last Answer : The circulatory system of mammals, also known as the cardiovascular system, plays a crucial role in the transport of oxygen, nutrients, hormones, and waste products throughout the body. It ... , its advantages outweigh the drawbacks and contribute to the overall functioning and survival of mammals.

Description : Can you help me find scholarly articles on 'Advantages and Disadvantages of Equities and Bonds as Investments'?

Last Answer : answer:Welcome to ask-public. How elementary an article do you want? That is, how much do you already know about the financial instruments themselves? Because one thing that few scholarly articles would tell you ... is, really know and not just think you know or heard from some people know.)

Description : What are the advantages and disadvantages of posting photos to Instagram?

Last Answer : Instagram is a social networking platform in its own right. You don’t need a Facebook account to use it, but you can use Instagram to post on multiple platforms. It’s just different strokes. Kind of like how some people share craft how-tos on Facebook and some use Pinterest.

Description : What advantages and disadvantages do you see with releasing every episode of a 'TV' series at the same time on an internet streaming provider, such as Netflix?

Last Answer : You can binge watch and not disrupt the continuity. No commercials. Pick and choose episodes you may have missed. I can’t think of a single disadvantage for the consumer.

Description : Do you let people into your heart, or do you keep everyone at arm's length and what are the advantages and disadvantages of each?

Last Answer : answer:Do you let people into your heart, or do you keep everyone at arm's length? Everyone I meet are kept at arm's length. But I try to get to know them, and when they turn out ... . And letting people into your heart will give you friends and companions, but you will also risk getting betrayed.

Description : What are the advantages and disadvantages of a grammatical gender system?

Last Answer : Ask the ancient Greeks, or better yet, ask the even more ancient Mycaeneans. It happened a long time ago; who knows why?

Description : What are the advantages and disadvantages of large (conventional) venetian blinds and mini-blinds?

Last Answer : Since it depends entirely on the location, size and use of the area, I suggest you visit the window covering section of your local home improvement store and discuss it with them. We have a great department at the Lowe’s near us.