Public Key Private Key
Public Key Private Key
Stream ciphers encrypt data one bit or byte at a time, making them faster and more
efficient for real-time communication like video streaming.
They require less memory compared to block ciphers.
8. Types of firewalls:
1. Message Authentication Codes (MAC): Uses a shared secret key for authentication.
2. Hash Functions: Validates data integrity using hash values.
3. Digital Signatures: Provides authentication and non-repudiation using public key
cryptography.
9. What are some threats associated with a direct digital signature scheme?
9. What are the primary steps involved in constructing a symmetric Key Cipher?
1. Key generation: Create a secure encryption key.
2. Data encryption: Encrypt plaintext using the symmetric key.
3. Transmission: Securely send the encrypted data.
4. Decryption: Use the same key to decrypt the ciphertext.