ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 5 - 212-82 discussion

Report
Export

Paul, a computer user, has shared information with his colleague using an online application. The online application used by Paul has been incorporated with the latest encryption mechanism. This mechanism encrypts data by using a sequence of photons that have a spinning trait while traveling from one end to another, and these photons keep changing their shapes during their course through filters: vertical, horizontal, forward slash, and backslash.

Identify the encryption mechanism demonstrated in the above scenario.

A.
Quantum cryptography
Answers
A.
Quantum cryptography
B.
Homomorphic encryption
Answers
B.
Homomorphic encryption
C.
Rivest Shamir Adleman encryption
Answers
C.
Rivest Shamir Adleman encryption
D.
Elliptic curve cryptography
Answers
D.
Elliptic curve cryptography
Suggested answer: A

Explanation:

Quantum cryptography is the encryption mechanism demonstrated in the above scenario. Quantum cryptography is a branch of cryptography that uses quantum physics to secure data transmission and communication. Quantum cryptography encrypts data by using a sequence of photons that have a spinning trait, called polarization, while traveling from one end to another. These photons keep changing their shapes, called states, during their course through filters: vertical, horizontal, forward slash, and backslash. Quantum cryptography ensures that any attempt to intercept or tamper with the data will alter the quantum states of the photons and be detected by the sender and receiver .

Homomorphic encryption is a type of encryption that allows computations to be performed on encrypted data without decrypting it first. Rivest Shamir Adleman (RSA) encryption is a type of asymmetric encryption that uses two keys, public and private, to encrypt and decrypt data. Elliptic curve cryptography (ECC) is a type of asymmetric encryption that uses mathematical curves to generate keys and perform encryption and decryption.

asked 18/09/2024
laurence peterson
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first