answersLogoWhite

0


Best Answer

the public key

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which part of the encryption mechanism is transferred and exchanged?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

How DRM works and what part encryption plays in this technology?

Digital Rights Management (DRM) is the means copy right holders protect their content so that it only is consumed as intended. Encryption can play a part in the protection by scrambling the content in such a fashion as it can only be decrypted as the copyright holder see's fit.


Is this true or false The main benefit of encryption of a hard drive is to make part of an ROI report?

someone give the answer I need it now!!!!!!!!!!!!!!!!!!!!!!!!!!!!!


What is meant by feeder mechanism?

Generally a feeder mechanism is a subordinate part of a larger production process. It provides and supplies materials to a production process, machine or person for further manufacturing and modification of a product to be carried out.


Which layer of the OSI model is responsible for formatting and encrypting data?

The layer of the OSI Model that deals with encryption, would be the sixth layer, the presentation layer. It deals with the SSL/TLS protocol which pretty much just turns your regular HTTP (hypertext transfer protocol) into HTTPS (hypertext transfer protocol secure.) It adds an encryption to certain web pages that would deal with you credit card or any other private information dealt with.


How does Public Key Encryption work?

The exact mathematics of the encryption differ depending on the algorithm used, but in principle, this is how it works. An algorithm is used to generate a pair of keys that are related mathematically. In many cases they are factors of a very large number. One of the keys is the Public key, which is published to a key registry. The other is the Private key which is held by the owner alone. The important thing is that it is supposed to be impossible to derive the Private key from the Public key. When the owner wants to send a message, the use the Private key to encrypt it or to sign it. Since only the corresponding Public key can decrypt it, that establishes that the sender is who they say they are (because only they should have the Private key). If the sender used their Private key to sign the message, the receiver can use the Public key verify that the message has not been tampered with. On the flip side, some can encrypt a message to the owner of the Private key by using that person's Public key. Only the holder of the Private key can decrypt the message. This can provide confidentiality. Two correspondents can establish secure communications by using each others Public keys to encrypt their messages. Often the public key is deposited with a trusted Certificate Authority. Assuming the user trusts the key repository, they can use them to authenticate the key they are using as belonging to the person it is supposed to belong to. To get more details on the mathematics of encryption and decrption using Public Key Encryption, aka asymmetric encryption. Do a web search for the particular algorithm involved, be it SSH, PGP, TLS, or some other protocol.

Related questions

What is the part of speech for exchanged?

Exchanged is a verb. It describes an action.


What part of speech is mechanism?

Noun


Reflexes are a part of the body's defense mechanism. true or false?

Reflexes are a part of the body's defense mechanism.


What is heat transferred from the sun transferred by?

the sky because it has an main part about about the sun and orbit on it


No gas is exchanged in what part of the respiratory system?

your windpipe. and your bronchals.your windpipe. and your bronchals.


What is connecting mechanism of nervous system?

connecting mechanism is the part of female that reproduce egg cell


Who or what types of website or companies use symmetric key encryption?

If you are using an encrypted channel, then at some point everyone uses symmetric encryption. It is fast (compared to asymmetric).The first part of an encrypted conversation will probably use asymmetric encryption to provide the shared private key that is later on used for the bulk part of data conversations on an encrypted channel.


What part of speech is the word transferred?

The word transferred is a verb. It is the past tense of the verb transfer.


How are classical encryption techniques like modern symmetric-key cipher?

In symmetric key techniques there is a single key and that key is kept secret. Symmetric key is a like a sub part of classical encryption.


Are reflexes a part of the body and defense mechanism?

true


Reflexes are part of the body's defense mechanism?

true


What part of a doornob is a wheel?

The part of a doorknob that is considered a wheel is the rotating mechanism inside the knob that allows it to turn and operate the latch mechanism to open or close the door.