--%>

Cryptographic keys used in PGP

Specify any cryptographic keys which are used in PGP?

E

Expert

Verified

Some of the cryptographic keys used in PGP are:

a) One-time session conventional keys.

b) Private keys.

c) Public keys.

d) Pass phrase based conventional keys.

   Related Questions in Computer Network Security

  • Q : Analysis on Wireless Technology 1.

    1. Summarize what is being accomplished in this section in a few sentences. What is being accomplished here is that we have created a sequence generator that outputs two short random messages. The multiple sequence source generates

  • Q : Ip Question 4 - You have been asked to

    Question 4 - You have been asked to design an IP addressing plan for a medium size corporation, Corporation (X) converting to an IP network. The corporation currently has 88 locations but plans to expand to approximately 100 Locations within the next year. Each location should have a user network

  • Q : Access control list or ACL ACL (Access

    ACL (Access control list): In order to control the access to a particular number of users the wireless network makes use of ACL which is access control list. In this the unique address of the clients or the users are used and hence a check can be put

  • Q : Advances of LAN Security Setup Advances

    Advances of LAN Security Setup: The company should use firewall in order to separate the wireless Local Area Network. A gateway/ firewall is used in order to separate the wireless and wired networks. This helps to screen the traffic in wired network.

  • Q : Explain LAN security in an Organization

    Introduction: The companies are able to deploy wireless LAN easily as the communication mode is wireless and hence no physical cables are put to use and drawing physical cable throughout the building incurs more time as compared to wireless LAN. With

  • Q : Project to simulate network attack

    Write an Idea for programming project to simulate a network attack or threat mechanism or a defense mechanism. Encipher message by using a keyword;

    Q : Headers fields in MME Explain the

    Explain the headers fields which are defined within the MME?

  • Q : End-to-end encryption and link State

    State the difference between end-to-end encryption and link?

  • Q : Limitations of SMTP/RFC 822 Explain

    Explain some of the limitations of the SMTP/RFC 822?

  • Q : What is Sub Bytes Explain what is meant

    Explain what is meant by Sub Bytes.