Encryption has a remarkably long and varied history. The invention of writing was apparently soon followed by a desire to conceal messages. One of the earliest methods, attributed to an ancient Roman emperor, was the simple substitution of numbers for letters, for example A = 1, B = 2, etc. This is an example of
A) a hashing algorithm.
B) symmetric key encryption.
C) asymmetric key encryption.
D) a public key.

Respuesta :

Answer: (B) Symmetric key encryption

Explanation:

 The symmetric key encryption is the computerize cryptography form that are used to show an electronic message by using the key the singular encryption. It is basically used in various mathematical algorithm for the purpose of data conversion.

In the symmetric key encryption, the computer system contain the secret key which is basically used to send the encrypt information in the form of packet over the network from one computer to another.  

Therefore, Option (B) is correct.

Otras preguntas

ACCESS MORE
EDU ACCESS
Universidad de Mexico