What Term Best Represents The Resiliency Of A Cryptographic Key To Attacks?
Share
Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
What term best represents the resiliency of a cryptographic key to attacks?
Answer: key strength best represents the resiliency of a cryptographic key to attacks.
Cryptography gives secure communication in the presence of the third person .it is considered as the method for secure communication which only permits the sender and the receiver to see the actual data which is transferred among them. It is related to encryption because the plain text is transferred to the unreadable form which is called ciphertext and the key is the element that unlocks the encryption process. The cryptographic techniques for the obstruction of the image are merging etc.
During the electronic communication of the data the cryptography encrypt and decode or decrypt the email; and another kind of plain text. Cryptography uses the secret key which is also called an asymmetric key, its work is to encrypt the data, and along with the message the key is sent toward the recipient which in turn used the secret key and decodes the actual content and read it.
Another asymmetric system is established in it both the sender and the receiver has key one is a public key which is present in the receiver which is requested by the sender and encrypt the message and send the key together when the message arrives the private key of the recipient and decrypt the message, and the theft has no use of the data without the private key.
Types of cryptography are described in the following:
Symmetric key: in this type, the public key is present at both ends: sender and receiver. the sender encrypts the message with the public key and sends it toward the recipient .while the recipient again uses the public key and decodes the ciphertext and reads the message.
Public key: The concept is revolving for the past hundreds of years in these methods the public key and private key are present. The public key as the name indicates is public and free distributed while the private key is associated with it. The public key encrypts the message and the private key responsible for the decryption.
Hash function: In this technique, no key is used. a constant length of the hash value is evaluated according to the plain text which makes the plain text difficult or impossible to recover .most of the operating system use the hash function for password encryption.
Best protective measure
Some of the protective measures are discussed below: