Win a copy of Beginning Java 17 Fundamentals: Object-Oriented Programming in Java 17 this week in the Java in General forum!
  • Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Tim Cooke
  • Campbell Ritchie
  • Ron McLeod
  • Liutauras Vilda
  • Jeanne Boyarsky
Sheriffs:
  • Junilu Lacar
  • Rob Spoor
  • Paul Clapham
Saloon Keepers:
  • Tim Holloway
  • Tim Moores
  • Jesse Silverman
  • Stephan van Hulst
  • Carey Brown
Bartenders:
  • Al Hobbs
  • Piet Souris
  • Frits Walraven

Exchanging Simetric Keys question.

 
Ranch Hand
Posts: 290
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hi folks, I have a question ..:

Which on the following statements about symmetric cryptography is false? (D).

A - The key must be secure shared between the sender and recipient. TRUE
B - The algorithm that uses the key to transform data is not considered part of the security system. - TRUE.
C - It's undemanding on system resources to encrypt and decrypt information. TRUE
D - It's often used to exchange symmetric keys so that faster symmetric encryption can be used. FALSE.


Folks could you please talk more about options C and D.

Tks in advance!!
 
Greenhorn
Posts: 17
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Cite from http://en.wikipedia.org/wiki/Symmetric-key_algorithm:

Symmetric-key algorithms are generally much less computationally intensive than asymmetric key algorithms. In practice, asymmetric key algorithm are typically hundreds to thousands times slower than a symmetric key algorithm.



This explains why C is true.
And D is false because actually the asymmetric encryption is used during SSL handshake to exchange symmetric keys. The second part of the sentence D is true - symmetric keys are later used as such an encryption method is faster
 
Consider Paul's rocket mass heater.
reply
    Bookmark Topic Watch Topic
  • New Topic