207k views
1 vote
The public-key algorithms are used to establish _________, which in turn is used to encrypt the actual data. This combines the flexibility of public-key cryptography with the efficiency of symmetric-key cryptography. A) Digital signatures

B) Secure channels

C) Session keys

D) Public keys

1 Answer

0 votes

Final answer:

Public-key algorithms establish session keys for securing data transmission, combining public-key cryptography flexibility and symmetric-key cryptography efficiency.

Step-by-step explanation:

The public-key algorithms are used to establish session keys, which in turn are used to encrypt the actual data. This process combines the flexibility of public-key cryptography with the efficiency of symmetric-key cryptography. In this case, session keys are used to create a secure channel for sensitive information to be safely transmitted over a network. Once the session key is established between two parties through the exchange of public keys, this temporary key is then used for the symmetric encryption and decryption of the actual message content, enhancing the overall security of digital communications.

User Zelphir Kaltstahl
by
7.8k points