subject

Bob and Kevin are both using crypto to communicate with other people. Bob doesn't want Kevin eavesdropping on his messages, and vice versa. They each need to choose algorithms and keys. Which of the following choices will protect one from eavesdropping by the other? Select all that apply.

A. Use the same algorithm and the same key.
B. Use different algorithms and the same key.
C. Use the same algorithm and different keys.
D. Use different algorithms and different keys.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 14:00
How are stop motion special effects in animated films created
Answers: 1
question
Computers and Technology, 23.06.2019 15:00
Barbara is interested in pursuing a career in the science and math pathway. which qualifications will her reach that goal? a.an advanced knowledge of physics and math b.an advanced knowledge of engineering and math c. an advanced knowledge of physics and robotics an d. advanced knowledge of machinery and math
Answers: 2
question
Computers and Technology, 24.06.2019 00:40
To maintain clarity and focus lighting might be needed
Answers: 2
question
Computers and Technology, 24.06.2019 02:00
Which steps will open the system so that you can enter a question and do a search for
Answers: 1
You know the right answer?
Bob and Kevin are both using crypto to communicate with other people. Bob doesn't want Kevin eavesdr...
Questions
question
Mathematics, 15.10.2019 04:50
question
Mathematics, 15.10.2019 04:50
question
Mathematics, 15.10.2019 04:50
question
Mathematics, 15.10.2019 04:50