answersLogoWhite

0

What else can I help you with?

Continue Learning about Computer Science

How DRM works and what part encryption plays in this technology?

Digital Rights Management (DRM) is the means copy right holders protect their content so that it only is consumed as intended. Encryption can play a part in the protection by scrambling the content in such a fashion as it can only be decrypted as the copyright holder see's fit.


Is this true or false The main benefit of encryption of a hard drive is to make part of an ROI report?

someone give the answer I need it now!!!!!!!!!!!!!!!!!!!!!!!!!!!!!


What is meant by feeder mechanism?

Generally a feeder mechanism is a subordinate part of a larger production process. It provides and supplies materials to a production process, machine or person for further manufacturing and modification of a product to be carried out.


Which layer of the OSI model is responsible for formatting and encrypting data?

The layer of the OSI Model that deals with encryption, would be the sixth layer, the presentation layer. It deals with the SSL/TLS protocol which pretty much just turns your regular HTTP (hypertext transfer protocol) into HTTPS (hypertext transfer protocol secure.) It adds an encryption to certain web pages that would deal with you credit card or any other private information dealt with.


How does Public Key Encryption work?

The exact mathematics of the encryption differ depending on the algorithm used, but in principle, this is how it works. An algorithm is used to generate a pair of keys that are related mathematically. In many cases they are factors of a very large number. One of the keys is the Public key, which is published to a key registry. The other is the Private key which is held by the owner alone. The important thing is that it is supposed to be impossible to derive the Private key from the Public key. When the owner wants to send a message, the use the Private key to encrypt it or to sign it. Since only the corresponding Public key can decrypt it, that establishes that the sender is who they say they are (because only they should have the Private key). If the sender used their Private key to sign the message, the receiver can use the Public key verify that the message has not been tampered with. On the flip side, some can encrypt a message to the owner of the Private key by using that person's Public key. Only the holder of the Private key can decrypt the message. This can provide confidentiality. Two correspondents can establish secure communications by using each others Public keys to encrypt their messages. Often the public key is deposited with a trusted Certificate Authority. Assuming the user trusts the key repository, they can use them to authenticate the key they are using as belonging to the person it is supposed to belong to. To get more details on the mathematics of encryption and decrption using Public Key Encryption, aka asymmetric encryption. Do a web search for the particular algorithm involved, be it SSH, PGP, TLS, or some other protocol.

Related Questions

What is the part of speech for exchanged?

Exchanged is a verb. It describes an action.


What part of speech is mechanism?

Noun


Reflexes are a part of the body's defense mechanism. true or false?

Reflexes are a part of the body's defense mechanism.


What is heat transferred from the sun transferred by?

the sky because it has an main part about about the sun and orbit on it


No gas is exchanged in what part of the respiratory system?

your windpipe. and your bronchals.your windpipe. and your bronchals.


What part of speech is the word transferred?

The word transferred is a verb. It is the past tense of the verb transfer.


What is connecting mechanism of nervous system?

connecting mechanism is the part of female that reproduce egg cell


Who or what types of website or companies use symmetric key encryption?

If you are using an encrypted channel, then at some point everyone uses symmetric encryption. It is fast (compared to asymmetric).The first part of an encrypted conversation will probably use asymmetric encryption to provide the shared private key that is later on used for the bulk part of data conversations on an encrypted channel.


Reflexes are part of the body's defense mechanism?

true


Are reflexes a part of the body and defense mechanism?

true


How are classical encryption techniques like modern symmetric-key cipher?

In symmetric key techniques there is a single key and that key is kept secret. Symmetric key is a like a sub part of classical encryption.


What part of a doornob is a wheel?

the part that you turn for anyone who asked this question

Trending Questions
Definition of commandline arguments? What are some negative and positive impacts about enviromental technology? How have both computers and improved health care changed the job market in the US? What is the address size of IPv5? How do you view downloads on computer? Assume a device draws 50ma of current and 150vdc across it what is its resistance? How do you install an earlier version of windows under vista? Can you provide an example of a question that contains an equal number of occurrences of the substrings "01" and "10"? Is using the administrator profile as an everyday profile harmful to your computer? What software is best for business technology optimization? 2000 mbz ml320 where do the ground wires from the 2nd o2 sensors heater wires connect do they ground to the body or through the computer if they connect to the computer which pins on which computer? What is scrambling in data communication? What are the Minimum components to make a PC functional? From which type of store can a computer get its data most quickly? What are two main types of ups? Why was the concept of Autonomous Systems introduced? What material could be put around the wires to insulate an electric cable and a plug? With the discretionary access control model the most common control implementation is through? What five tips will help ensure that your news release will be successful and appealing? Ability for a computer to increase workload as the number of processors increases is known as?