Match each item with a statement below.

A. Procedures based on a mathematical formula used to encrypt and decrypt the data
B. Cryptography that uses two mathematically related keys
C. The unique digital fingerprint created by a one-way hash algorithm
D. A mathematical value entered into a cryptographic algorithm to produce encrypted data
E. Unencrypted data
F. The process of proving that a user performed an action
G. An asymmetric encryption key that must be protected
H. An asymmetric encryption key that does not have to be protected
I. Encryption that uses a single key to encrypt and decrypt a message

A. algorithm
B. asymmetric cryptography
C. digest
D. key
E. cleartext
F. nonrepudiation
G. private key
H. public key
I. symmetric cryptography

Computer Science & Information Technology

You might also like to view...

You can use ________ to write code in the Visual Basic for Applications language

A) Word B) Visual Basic Editor C) Access D) Macro Recorder

Computer Science & Information Technology

A distributed reflection denial of service attack requires the attacker to first compromise the routers that will carry out the attack

Indicate whether the statement is true or false.

Computer Science & Information Technology