1,186 views
2 votes
2 votes
Link encryption

a) is more secure than end-to-end encryption

b) is less secure than end-to-end encryption

c) can not be used in public network

d) none

2 Answers

1 votes
1 votes

ans should be A 

Encryption can be performed at different communication levels, each with different types of protection and implications. Two general modes of encryption implementation are link encryption and end-to-end encryption. Link encryption encrypts all the data along a specific communication path, as in a satellite link, T3 line, or telephone circuit. Not only is the user information encrypted, but the header, trailers, addresses, and routing data that are part of the packets are also encrypted. The only traffic not encrypted in this technology is the data link control messaging information, which includes instructions and parameters that the different link devices use to synchronize communication methods. Link encryption provides protection against packet sniffers and eavesdroppers. In end-to-end encryptionthe headers, addresses, routing, and trailer information are not encrypted, enabling attackers to learn more about a captured packet and where it is headed.

Link encryption, which is sometimes called online encryption, is usually provided by service providers and is incorporated into network protocols. All of the information is encrypted, and the packets must be decrypted at each hop so the router, or other intermediate device, knows where to send the packet next. The router must decrypt the header portion of the packet, read the routing and address information within the header, and then re-encrypt it and send it on its way.

refer https://neodean.wordpress.com/2009/12/29/link-encryption-vs-end-to-end-encryption/

0 votes
0 votes

Off course.
The answer is
b) is less secure than end-to-end encryption

Link encryption differs from end-to-end encryption mainly in the fact that it encrypts and decrypts all traffic at every point, not just at the end points.

Answer:

Related questions

0 votes
0 votes
0 answers
1
Balaji Jegan asked Oct 23, 2018
132 views
0 votes
0 votes
0 answers
2
sushmita asked Jan 19, 2017
823 views
ENCRYPTION AND DECRYPTION OF DATA ARE RESPONSIBILITY OF WHICH LAYER IN OSI MODEL??
0 votes
0 votes
0 answers
3
0 votes
0 votes
0 answers
4
adi.stephen asked Jan 29, 2016
258 views
how many keys are required for n indiviuals to communicate using secret and public key