Unformatted text preview: 3. What does public key cryptography provide that private key cryptography does not? It enables one person to hold on to a key so they are the only one that can decrypt the data and it keeps it safe from the data being decrypted by people without the authorization. 4. What makes a hash different from the ciphertext generated by an algorithm that is used for standard transmission of data? A hash remains the same for data as long as it is not altered in any way. If the hash is different then the data has been altered in one way no matter how small. 5. Suppose that you receive an encrypted message that contains a MIC. How would you know that the data had not been altered in transit? The MIC matches exactly as it did before it was sent. If it does not match that means something has been changed even if it is a small change....
View Full Document
- Spring '11
- Public-key cryptography, Pretty Good Privacy, Symmetric-key algorithm, GNU Privacy Guard, key cryptography, James Kirn