This preview shows page 1. Sign up to view the full content.
Unformatted text preview: 3. What does public key cryptography provide that private key cryptography does not? It enables one person to hold on to a key so they are the only one that can decrypt the data and it keeps it safe from the data being decrypted by people without the authorization. 4. What makes a hash different from the ciphertext generated by an algorithm that is used for standard transmission of data? A hash remains the same for data as long as it is not altered in any way. If the hash is different then the data has been altered in one way no matter how small. 5. Suppose that you receive an encrypted message that contains a MIC. How would you know that the data had not been altered in transit? The MIC matches exactly as it did before it was sent. If it does not match that means something has been changed even if it is a small change....
View Full Document
This note was uploaded on 11/07/2011 for the course SEC 120 taught by Professor Unknown during the Spring '11 term at DeVry Addison.
- Spring '11