Q&A

Q1:Bob encrypted a file and copied it to a floppy disk. He also placed his key on the floppy to decrypt the file. Does Bob's encryption program use symmetric or asymmetric encryption?
A1: Bob's encryption program uses symmetric encryption. You can tell because he plans to use the same key to decrypt the file that he used to encrypt it. Does it seem strange to you that Bob included the key on the floppy along with the encrypted file? This is a very bad idea. What is the point of encrypting the file if you are going to transport the key along with it? Anyone who finds the file will also find the key.
Q2:Why doesn't SSL work with UDP?
A2: As you learned in Hour 6, UDP is a Transport layer protocol like TCP that also provides ports and sockets ...

Get Sams Teach Yourself TCP/IP in 24 Hours, Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.