Question: 1) A symmetric key cryptographic algorithm generates a one-to-one mapping? Why? Note down one advantage and one disadvantage of using symmetric key cryptography. 2)Explain how
1) A symmetric key cryptographic algorithm generates a one-to-one mapping? Why? Note down one advantage and one disadvantage of using symmetric key cryptography.
2)Explain how public-key cryptography is used for identification. You may want to explain it with a pair of users, say, Bob and Alice.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
