Computer Science for IGCSE & O level - Data Transmission (Section 12 - No. 33)
What is a potential vulnerability when using symmetric encryption?
The key exchange process.
The public key is compromised.
The algorithm is too complex.
The data becomes fragmented.
Explanation
The secure exchange of the shared key is a potential point of weakness.
Comments (0)
