Podcast
Questions and Answers
Asymmetric cryptography uses ______ keys: a private key and a public key.
Asymmetric cryptography uses ______ keys: a private key and a public key.
two
______ key cryptography uses the same key for encryption and decryption.
______ key cryptography uses the same key for encryption and decryption.
Symmetric
The receiver's ______ key is used to decrypt the message in asymmetric cryptography.
The receiver's ______ key is used to decrypt the message in asymmetric cryptography.
private
Sender Alice uses the receiver's ______ key to encrypt the message.
Sender Alice uses the receiver's ______ key to encrypt the message.
Network security provides five ______ services.
Network security provides five ______ services.
Message ______ ensures that the transmitted message makes sense only to the intended receiver.
Message ______ ensures that the transmitted message makes sense only to the intended receiver.
Message ______ ensures that the data arrives at the receiver exactly as they were sent.
Message ______ ensures that the data arrives at the receiver exactly as they were sent.
______ cryptosystems can be used to achieve message confidentiality.
______ cryptosystems can be used to achieve message confidentiality.
RSA is an example of ______ key cryptography.
RSA is an example of ______ key cryptography.
Diffie-Hellman is an example of ______ key cryptography.
Diffie-Hellman is an example of ______ key cryptography.
Flashcards are hidden until you start studying