answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimulka [17.4K]
2 years ago
4

NetSecIT is a multinational IT services company consisting of 120,000 computers that have Internet access and 45,000 servers. Al

l employees communicate using smartphones and email. Many employees work from home and travel extensively. NetSecIT would like to implement an asymmetric general-purpose encryption technology that is very difficult to break and has a compact design so that there is not a lot of overhead. What encryption solution that best meets the company's needs and justify the recommendation?
Computers and Technology
1 answer:
RSB [31]2 years ago
6 0

Answer and Explanation:

Basically, NetSecIT is a software house where employees are connecting with each other through 120,000 computers and 45,000 servers. They are communicating using smartphones and email. For this purpose, NetSecIt implements asymmetric encryption in their software house. Lets us clear the Asymmetric Encryption first.

Asymmetric Encryption

Asymmetric encryption is used for encrypting and digitally signing data.It involved in communication as well. It has two major algorithm which has been used according to situation.  

Major Algorithms are

  • Diffie-Hellman key agreement (DH)
  • Rivest Shamir Adleman (RSA)
  • Elliptic Curve Cryto graph y (ECG)
  • Digital Signature Algorithm (DSA)    

Diffie-Hellman key agreement (DH)

DH is not for encryption and decryption of data but it is used when two parties are involved in communication. they generate a key for exchange the information.

For example  

we have two parties that is Q1 and Q2  

Both parties had choose two integers p and l then  

1<p<l.

Q1 chooses randomly an integer i and send it to Q2 using variable p B=a^i

Q2 chooses a randomly an integer j and send it to Q1 using variable p C=a^j

Q1 computes m1 = B^i mode l

Q2 computes m2 = C^i mode l

then m1 and m2 are secret keys.

Similarly  

Rivest Shamir Adleman (RSA)

RSA is using for encryption and decryption.  

Elliptic Curve Cryto graph y (ECG)

is basically used for smaller devices like cell phones.It requires less computing power compared with RSA. ECG based on a curve that contain public / private key pair

Digital Signature Algorithm (DSA)

DSA is used for creating some digital signals faster than validating it.

All these algorithm has been used for encryption  

So as NetSecIt has a general purpose of using encryption technology so after a brief description of asymmetric encryption you can see that its some algorithm have better impact on the situation such as Digital Signature Algorithm DSA , RSA and Elliptic Curve Cryto graph y (ECG). So company has to used some algorithm for using asymmetric algorithm in their company then they will communicate with their employee and employee communicate using smartphone and email.Hence proved encryption solution is a best meet the company's needs.

You might be interested in
Which statements describe the Sort List feature of Word? Check all that apply.
natulia [17]

Answer: It arranges text in a list alphabetically from A to Z.

Explanation: It's always easier and more systematic to arrange alphabetically. With numbers there is the possibility of infinity but not with alphabet which have a defined range.

7 0
2 years ago
Read 2 more answers
What is the name of the item that supplies the exact or near exact voltage at the required wattage to all of the circuitry insid
gizmo_the_mogwai [7]

Answer:

It's the <u><em>power supply</em></u>

Explanation:

The power supply is what essentially enables the computer to operate. It is able to do that by converting the incoming alternating current (AC) to direct current (DC) at the correct wattage rating that is required by the computer to function. The power supply is a metal box that is generally placed in the corner of the case.

4 0
2 years ago
The ratio of Chris an iood Dom's ages is
irinina [24]

Answer:

28 years

Explanation:

Let's represent present age of Chris and Dom as C and D respectively. Then since ratio of present age of Chris and Dom is 3:4. Therefore,

\frac{C}{D}=\frac{3}{4}

C=\frac{3}{4}D   ...(1)

Now, it is given that in 7 years their age ratio will become 4:5. Therefore,

\frac{C+7}{D+7}=\frac{4}{5}

5C+35=4D+28\\

Using value of C from equation(1),

5\times\frac{3}{4}D-4D=28-35

15D-16D=-28\\-D=-28\\ D=28

Thus, present age of Dom is 28 years.

8 0
3 years ago
PLEASE HELP!!~~
Law Incorporation [45]

Answer:

A

Explanation:

7 0
2 years ago
Nicole wants to create a database to collect information about videos in her video rental store. She would like to use the datab
Verizon [17]

Answer:

All the field which she has mention has to created by Nichole in her database.

Explanation:

The following fields have to be created in the database

title, rating, actor, and producer rating, director, and actor title, rating, actor 1, actor 2, actor 2, actor 4, producer, and in the stock product number, price, and rating

 

And additional field also has to create movie-length also as integer field which should carry the length of the movie  

Date of release and movie certificate also can be captured so the search engine will be very useful

3 0
2 years ago
Other questions:
  • my headphones have a mic and the mic and headset don't work at the same time what do i do to make them work together
    8·2 answers
  • Which references are updated when you copy the formula =$E6-MAX(H$1:J4)
    10·1 answer
  • Fill in the blank; "As well as their traditional role of computing data, computers are also extensively used for..."
    14·1 answer
  • Programming challenge description: Write a program that, given two binary numbers represented as strings, prints their sum in bi
    6·1 answer
  • Write the routines with the following declarations: void permute( const string &amp; str ); void permute( const string &amp; str
    14·1 answer
  • Write a program that plays a reverse guessing game with the user. The user thinks of a number between 1 and 10, and the computer
    5·1 answer
  • In this exercise we look at memory locality properties of matrix computation. Th e following code is written in C, where element
    9·1 answer
  • Why is it important for element IDs to have meaningful names?
    11·1 answer
  • What is the value of the variable result after these lines of code are executed?
    5·2 answers
  • A group of developers for a startup company store their source code and binary files on a shared open-source repository platform
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!