a differentiate between encryption and


a) Differentiate between encryption and decryption.

b) Explain how cryptography works.

c) List down three examples of symmetric key algorithms and two examples of asymmetric encryption algorithms.

d) Explain using suitable illustrations where necessary how asymmetric public key encryption ensures both confidentiality and authenticity.

e) Explain the role of the following players in a Public Key Infrastructure (PKI)

(i) Certification authority
(ii) Certificate holder
(iii) Relying party

Request for Solution File

Ask an Expert for Answer!!
Management Theories: a differentiate between encryption and
Reference No:- TGS0358645

Expected delivery within 24 Hours