answersLogoWhite

0


Best Answer

ONE

Answer Explanation: Only one key would be required for everyone to be able to encrypt and decrypt the message. Symmetric cryptography uses the same "shared secret" key for encrypting and decrypting a message. A message encrypted using a symmetric encryption algorithm can be decrypted by anyone with the key. For this reason it is very important to ensure that the key is protected from unauthorized use. One of the primary security issues surrounding the use of symmetric cryptography is the method used to transport the key to users who need it, as most forms of communication are susceptible to eavesdropping.

User Avatar

Wiki User

βˆ™ 13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How many different keys will be required to give four people the ability to encrypt and decrypt the message using a symmetric cryptography algorithm?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What are the ways representing an algorithm?

You can represent an algorithm by three different ways: 1. Pseudo Code 2. Structured flow charts 3. Actual code


What is stantard algorithm?

Algorithm means Step-by-Step procedure to acheive the required result in a meaningful manner. standard algorithm is one which not only concerate to get the required result but follows some systematic approach to get that result...


How is cryptography related to math?

Cryptography is the study of hiding information using mathematical algorithms in such a way that the original information cannot be assertained from the resulting 'cyphercode' without knowledge of the specific 'key' required to undo the changes made by the algorithm.The algorithms used in cryptography are related to math, being mathematically founded, and so, by extension, cryptography is related to math.


What is the minimum number of cryptographic keys required for secure two-way communications in asymmetric key cryptography?

2


How many keys are required for two people to communication via a cipher?

That depends on whether you use a symmetric (shared key) or asymmetric (public/private key pair) algorithm. If you use a symmetric key, it means both people have the same key which has been pre-shared via some secure means. In that case, only one key is required; both parties in the communication use the same key to encrypt and decrypt all messages. If you use an asymmetric key algorithm, it takes at least 4 keys total: when sending a message each user will encrypt their message with the public key of the recipient (that accounts for two of the keys). Each recipient must then use their private key to decrypt the messages they receive (which accounts for the other two required keys).


What type of error in an algorithm will produce unexpected results depending on the number that the user inputs?

Algorithms do not accept user input; they are not computer programs. All input to an algorithm is specified at the start of the algorithm along with any required preconditions and postconditions. If a required precondition is not specified or is specified incorrectly, then this could result in unexpected results (or undefined behaviour in programming terminology). The type of error in the algorithm is simply that the precondition was not specified.


Compare public key cryptography and Symmetric key cryptography?

In public key cryptography there are two parts: 1) secret part 2) public part ,in order for p1 to send p2 a message ,p1 first need to obtain p2's public key and using this key encrypts the message then p2 using his secret key decrypts the message. And in private key cryptograhy there is only one key so in order for p1 to send a message to p2, p1 should firstly ask p2 for his key then encrypt the message using that key and then p2 uses the same key to decrypt the message.


Algorithm A completes 3 cycles in one minute. Each of Algorithm B and Algorithm C respectively completes 4 and 5?

The full Question...Suppose 3 algorithms are used to perform the same task for a certain number of cycles. Algorithm A completes 3 cycles in one minute. Each of Algorithm B and Algorithm C respectively completes 4 and 5 cycles per minute. What is the shortest time required for each Algorithm to complete the same number of cycles?


How many adders are required to realize a 256point radix-2 DIT-FFT algorithm?

i don’t know


Algorithm for 16 bit booth multiplier?

are sahi se ans do dia karo.My ques is how many bits are required for 16-bit system in booth's algorithm?Pls reply me soon


Write a algorithm for multiplication tabel for an integer?

Algorithm: 1. From the user collect the integer whose table is required 2. Use a loop with loop counter starting with 0x01 and ends till the table value is required 3. start multiplication the input number with the loop variable and print the result.


A wireless access point is configured for WPA2 Which encryption algorithm will all devices that connect to the access point be required to use?

AES