Match each item with a statement below.

A. Procedures based on a mathematical formula used to encrypt and decrypt the data
B. Cryptography that uses two mathematically related keys
C. The unique digital fingerprint created by a one-way hash algorithm
D. A mathematical value entered into a cryptographic algorithm to produce encrypted data
E. Unencrypted data
F. The process of proving that a user performed an action
G. An asymmetric encryption key that must be protected
H. An asymmetric encryption key that does not have to be protected
I. Encryption that uses a single key to encrypt and decrypt a message


A. algorithm
B. asymmetric cryptography
C. digest
D. key
E. cleartext
F. nonrepudiation
G. private key
H. public key
I. symmetric cryptography

Computer Science & Information Technology

You might also like to view...

What technologies help make printed or displayed text accessible to people who are blind?

What will be an ideal response?

Computer Science & Information Technology

What will be output from the following code:

Computer Science & Information Technology

A check digit is a digit that is added in the middle of a number to validate the number's authenticity.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

If there is an element of a layer that you wish to protect, such as transparency, you can ____________________ it to prevent changes.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology