Encryption algorithms transform readable plaintext into ciphertext using a secret key. Intercepted ciphertext appears as random symbols to attackers, protecting confidentiality during transmission. The intended recipient uses the appropriate key to decrypt the data back into readable form. Thus, the core purpose of encryption is to ensure that only authorised parties can interpret the transmitted information.
Option A:
Compression aims to reduce file size but does not inherently prevent others from reading the content. Compressed data can often be decompressed without needing a secret key.
Option B:
This option correctly captures the idea of confidentiality and controlled readability, which underpins secure communication protocols like HTTPS and VPNs. It reflects standard practice in protecting sensitive data on public networks.
Option C:
Deleting data from the senderโs system is a separate action and is not achieved merely by encrypting it in transit. Encryption does not erase original copies.
Option D:
Making data freely readable to everyone contradicts the aim of encryption. Security mechanisms are designed to limit, not broaden, unauthorised access.
Comment Your Answer
Please login to comment your answer.
Sign In
Sign Up
Answers commented by others
No answers commented yet. Be the first to comment!