Link Encryption Exposes Plaintext Nodes | Generated by AI

Home 2026.03

Question: When link encryption is used for information, how does information exist at each intermediate node in the network?

Correct Answer: D — Plaintext


Answer:

Link encryption (also called online encryption) operates at the Data Link Layer — it encrypts data only on the physical transmission links between adjacent nodes. The key characteristic is:

In link encryption, from source to destination, data passes through many intermediate nodes. At each intermediate node, the message is exposed in plaintext (except in node encryption). If any node on the link has weak security protection, then according to the “weakest link” principle, the overall link security is only as strong as the weakest node.

Why the Answer is D (Plaintext), Not C (Ciphertext)

This is a subtle but critical distinction:

Location State of Data
On the wire (between nodes) Ciphertext
Inside an intermediate node Plaintext

The question asks about how information exists at the nodes — not on the links. Since each node must decrypt to read routing information and then re-encrypt for the next hop, the receiving party for each link segment is the intermediate node machine itself, and information must be decrypted and re-encrypted at each node, thus appearing in plaintext inside each node.

Why This Is a Security Weakness

This is the biggest vulnerability of link encryption: every intermediate node becomes a potential attack surface. An attacker who compromises any intermediate node gains full access to plaintext data.

This contrasts with:

Why Option C (Ciphertext) Is a Common Mistake

Many students confuse the transmission links (where data IS ciphertext) with the nodes themselves (where data must be plaintext for routing/processing). The question specifically asks about existence at the nodes, making D (Plaintext) the correct answer.


References:


Back Donate