--%>

Distribution of secret keys to communicating parties

Specify the ways through which the secret keys may be distributed to the two communicating parties.

E

Expert

Verified

a) A can selects the key and physically deliver it to the B.

b) A third party may select the key and then physically deliver it to A and B.

c)  If A and B have previously and currently used the key, one party may send the new key to another, encrypted by using the old key.

d) If A and B each has the encrypted connection to the third party C, C may deliver the key upon the encrypted links to A and B.

   Related Questions in Computer Network Security

  • Q : The purpose of data security 1.

    1. Introduction: The purpose of data security is to ensure the business continuity and minimize damage by Preventing and minimizing the effect of security incidents. Data and Information security management gives an enabling mechanism to share information which ensures the protection of informatio

  • Q : Define Google click fraud Google click

    Google click fraud: It is a type of internet crime which occurs in pay per click online advertising while a person, automated script, or computer program imitates legitimate user of any web browser clicking on an ad, for producing a charge per click w

  • Q : What is ReefEdge Connect System

    ReefEdge Connect System: The ReefEdge connect system works on three layers of security: privacy, access control and authentication. The system then recognizes the technologies needed to address the security requirement for each of the above mentioned

  • Q : What is triple encryption Explain the

    Explain the term triple encryption?

  • Q : Explain Kerberos Explain the term

    Explain the term Kerberos.

  • Q : Internal and external error control

    Explain the term internal and external error control.

  • Q : Mathematical constants used in RC5

    Specify the common mathematical constants which are used in RC5?

  • Q : Types of Computer crimes Explain the

    Explain the various types of Computer crimes ?

  • Q : Rot Word and Shift Rows Explain

    Explain difference between the Rot Word and Shift Rows?

  • Q : Explain LAN security in an Organization

    Introduction: The companies are able to deploy wireless LAN easily as the communication mode is wireless and hence no physical cables are put to use and drawing physical cable throughout the building incurs more time as compared to wireless LAN. With