Encryption Decryption Question:
Download Questions PDF

What is Public-Key Cryptography?

Answers:

Answer #1
Traditional cryptography is based on the sender and receiver of a message knowing and using the same secret key: the sender uses the secret key to encrypt the message, and the receiver uses the same secret key to decrypt the message. This method is known as secret-key or symmetric cryptography. The main problem is getting the sender and receiver to agree on the secret key without anyone else finding out. If they are in separate physical locations, they must trust a courier, or a phone system, or some other transmission medium to prevent the disclosure of the secret key being communicated. Anyone who overhears or intercepts the key in transit can later read, modify, and forge all messages encrypted or authenticated using that key. The generation, transmission and storage of keys is called key management; all cryptosystems must deal with key management issues. Because all keys in a secret-key cryptosystem must remain secret, secret-key cryptography often has difficulty providing secure key management, especially in open systems with a large number of users.

Answer #2
Encryption is an important process that converts data into an unreadable form. Decryption reverses all that and changes it back to its readable original form. These processes are very important for keeping confidential data such as usernames and passwords safe from hackers.

Download Encryption Decryption Interview Questions And Answers PDF

Previous QuestionNext Question
What are the Advantages and Disadvantages of Public-Key Cryptography Compared with Secret-Key Cryptography?What is Multiple Encryption?