What career can I get in 6 months? - ProProfs Discuss
Advertisement

What career can I get in 6 months?

Asked by Hemangdoshi, Last updated: Mar 04, 2024

+ Answer
Request
Question menu
Vote up Vote down

1 Answer

hemangdoshi999

hemangdoshi

hemangdoshi999
Hemangdoshi

Answered Mar 05, 2018

D. The recipient uses the sender s public key, verified with a certificate authority, to decrypt the prehash code. decrypt the prehash code.

Most encrypted transactions use a combination of private keys, public keys, secret keys, hash functions and digital certificates to achieve confidentiality, message integrity and nonrepudiation by either sender or recipient. The recipient uses the senders public key to decrypt the prehash code into a posthash code, which when equaling the prehash code, verifies the identity of the sender and that the message has not been changed in route; this would provide the greatest assurance. Each sender and recipient has a private key known only to him/her and a public key, which can be known by anyone. Each encryption/decryption process requires at least one public key and one private key and both must be from the same party. A single, secret key is used to encrypt the message, because secret key encryption requires less processing power than using public and private keys. A digital certificate, signed by a certificate authority, validates senders and recipients public keys.
upvote downvote
Reply 

Advertisement
Advertisement
Search for Google images Google Image Icon
Select a recommended image
Upload from your computer Loader
Image Preview
Search for Google images Google Image Icon
Select a recommended image
Upload from your computer Loader
Image Preview
Search for Google images Google Image Icon
Select a recommended image
Upload from your computer Loader

Email Sent
We have sent an email to your address "" with instructions to reset your password.