Podcast
Questions and Answers
Less common than RSA, used in protocols like PGP Diffie-Hellman is the first key agreement algorithm message digest is a fingerprint for a document. Process of generating a message digest from data is called ______.
Less common than RSA, used in protocols like PGP Diffie-Hellman is the first key agreement algorithm message digest is a fingerprint for a document. Process of generating a message digest from data is called ______.
hashing
Password is a secret character string only known to user and server. Kerberos is an authentication service that uses symmetric key encryption and a key distribution center. Personal Tokens are hardware devices that generate unique strings that are usually used in conjunction with passwords for ______.
Password is a secret character string only known to user and server. Kerberos is an authentication service that uses symmetric key encryption and a key distribution center. Personal Tokens are hardware devices that generate unique strings that are usually used in conjunction with passwords for ______.
authentication
Biometrics - Uses certain biological characteristics for ______.
Biometrics - Uses certain biological characteristics for ______.
authentication
Iris Recognition - The scanning process takes advantage of the natural patterns in people's irises, digitizing them for ______ purposes.
Iris Recognition - The scanning process takes advantage of the natural patterns in people's irises, digitizing them for ______ purposes.
Signup and view all the answers
A digital signature is a data item that accompanies or is logically associated with a digitally encoded message. A digital certificate is a signed statement by a trusted party that another party’s public key belongs to them. Chaining is the practice of signing a certificate with another private key that has a certificate for its public ______.
A digital signature is a data item that accompanies or is logically associated with a digitally encoded message. A digital certificate is a signed statement by a trusted party that another party’s public key belongs to them. Chaining is the practice of signing a certificate with another private key that has a certificate for its public ______.
Signup and view all the answers