--%>

Cryptographic keys used in PGP

Specify any cryptographic keys which are used in PGP?

E

Expert

Verified

Some of the cryptographic keys used in PGP are:

a) One-time session conventional keys.

b) Private keys.

c) Public keys.

d) Pass phrase based conventional keys.

   Related Questions in Computer Network Security

  • Q : Ip Question 4 - You have been asked to

    Question 4 - You have been asked to design an IP addressing plan for a medium size corporation, Corporation (X) converting to an IP network. The corporation currently has 88 locations but plans to expand to approximately 100 Locations within the next year. Each location should have a user network

  • Q : AES and Rijndael State difference

    State difference between the AES and Rijndael?

  • Q : Suppose you worked for a US- based

    Suppose you worked for a US- based company that wanted to develop its own MIB for managing a product line. Where in the object identifier tree would it be registered? ( Hint: You’ll have to do some digging through RFCs or other documents to answer this question.)

  • Q : Competition matrix-Michael Porters

    The competition matrix is a term used while talking about strategy development, first used by Michael E. Porter 1983. They tell about product politics in marketing for individual business fields of an enterprise to gain competition advantage. In this,

  • Q : Analysis on Wireless Technology 1.

    1. Summarize what is being accomplished in this section in a few sentences. What is being accomplished here is that we have created a sequence generator that outputs two short random messages. The multiple sequence source generates

  • Q : Define Wifi Broadband What do you mean

    What do you mean by the term Wifi Broadband?

  • Q : Sub Word and Sub Bytes Explain

    Explain difference between the Sub Word and Sub Bytes?

  • Q : Purpose of State array State the

    State the purpose of State array?

  • Q : Reasons for using PGP Specify the

    Specify the reasons for using the PGP?

  • Q : Cryptographic Systems What are

    What are Cryptographic Systems?