Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

For the encryption methods and protocols listed below, identify the ones used fo

ID: 3727691 • Letter: F

Question

For the encryption methods and protocols listed below, identify the ones used for: web browser traffic, email, wireless network traffic, and data using a symmetric key.

TKIP

SSL

S/MIME

DES

WEP

WPA

PGP

S-HTTP

WPA2

3DES

----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

- web browser traffic

-email

-wireless network traffic

-data using a symmetric key

Explanation / Answer

TKIP - Temporal Key Integrity Protocol for wireless protocol
SSL - Secure socket layer - Web browser
S/MIME - Secure/Multipurpose Internet Mail Extensions - Emails
DES - data using a symmetric key
WEP - Wired Equivalent Privacy - Wireless network
WPA - Wi fi Protected Access - Wireless network
PGP - Pretty Good Privacy - emails
S-HTTP - Secure HTTP - Web browser
WPA2 - Wi fi Protected Access 2 - Wireless network
3DES - data using a symmetric key