--%>

Distribution of secret keys to communicating parties

Specify the ways through which the secret keys may be distributed to the two communicating parties.

E

Expert

Verified

a) A can selects the key and physically deliver it to the B.

b) A third party may select the key and then physically deliver it to A and B.

c)  If A and B have previously and currently used the key, one party may send the new key to another, encrypted by using the old key.

d) If A and B each has the encrypted connection to the third party C, C may deliver the key upon the encrypted links to A and B.

   Related Questions in Computer Network Security

  • Q : Suppose you worked for a US- based

    Suppose you worked for a US- based company that wanted to develop its own MIB for managing a product line. Where in the object identifier tree would it be registered? ( Hint: You’ll have to do some digging through RFCs or other documents to answer this question.)

  • Q : IP addressing and Subnetting

    Assumption: All subnet values can be used and the all "0"s is the first subnet. Question 1 - You have been assigned the 160.5

  • Q : The purpose of data security 1.

    1. Introduction: The purpose of data security is to ensure the business continuity and minimize damage by Preventing and minimizing the effect of security incidents. Data and Information security management gives an enabling mechanism to share information which ensures the protection of informatio

  • Q : Cryptographic keys used in PGP Specify

    Specify any cryptographic keys which are used in PGP?

  • Q : Define Google click fraud Google click

    Google click fraud: It is a type of internet crime which occurs in pay per click online advertising while a person, automated script, or computer program imitates legitimate user of any web browser clicking on an ad, for producing a charge per click w

  • Q : Mathematical constants used in RC5

    Specify the common mathematical constants which are used in RC5?

  • Q : AES and Rijndael State difference

    State difference between the AES and Rijndael?

  • Q : Network layers What are the methods

    What are the methods used by a station to sense whether a station is idle or busy? Explain with a neat diagram.

  • Q : Ethics of information technology i need

    i need a rational diagram for this assignment.can u plz help me out.job id is TG12WAH514COM

  • Q : Wireless Antennas with significance

    Explain the term Wireless Antennas with significance?