Match each item with a statement below.
A. Procedures based on a mathematical formula used to encrypt and decrypt the data
B. Cryptography that uses two mathematically related keys
C. The unique digital fingerprint created by a one-way hash algorithm
D. A mathematical value entered into a cryptographic algorithm to produce encrypted data
E. Unencrypted data
F. The process of proving that a user performed an action
G. An asymmetric encryption key that must be protected
H. An asymmetric encryption key that does not have to be protected
I. Encryption that uses a single key to encrypt and decrypt a message
A. algorithm
B. asymmetric cryptography
C. digest
D. key
E. cleartext
F. nonrepudiation
G. private key
H. public key
I. symmetric cryptography
You might also like to view...
You can use ________ to write code in the Visual Basic for Applications language
A) Word B) Visual Basic Editor C) Access D) Macro Recorder
A distributed reflection denial of service attack requires the attacker to first compromise the routers that will carry out the attack
Indicate whether the statement is true or false.