Answers 2 of the 7 questions below. Each answer must contain at least 250 words

Answers 2 of the 7 questions below. Each answer must contain at least 250 words for a total of 500 words altogether with 2 unique and relevant scholarly peer reviewed journal articles / references.
Discuss 2 of the following:
1. Is link encryption useful to individuals, or is it only for organizations having many users? Explain your answer.
2. What are the disadvantages of employing both link and end-to-end encryption?
3. Explain why the names “symmetric” and “asymmetric encryption” are appropriate.
4. Explain why encrypting with a sender’s private key demonstrates authenticity.
5. Explain why encrypting with a receiver’s public key achieves confidentiality.
6. Can a symmetric encryption algorithm be used to implement integrity? Explain your answer. Can an asymmetric encryption algorithm be used to implement integrity? Explain your answer.
7. Breaking encryption by cryptanalysis is quite difficult; performing a physical wiretap is, in comparison, less difficult. Give other even less difficult ways to obtain sensitive data.

Posted in Uncategorized

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount