Match each item with a statement below:

A. considered the core API set of the Java programming that is built around the java.security package and its subpackages
B. provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
C. provides interfaces and classes for key specifications and algorithm parameter specifications
D. a set of rules for encoding ASN.1 objects into a sequence of octets
E. a language for abstractly describing messages to be exchanged over a variety of networks
F. provides verification of the original content of the message
G. also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
H. additional data added to plaintext in order to make it divisible by the cipher's block size
I. provides the functionality of a cryptographic cipher for encryption and decryption


A. JCA
B. java.security.cert
C. java.security.spec
D. DER
E. ASN
F. Message digest
G. Secret key encryption
H. Padding
I. Cipher class

Computer Science & Information Technology

You might also like to view...

Relational operators are most often used to compare types of objects.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Using a smartphone to pay an electric bill is an example of ________ technology

Fill in the blank(s) with correct word

Computer Science & Information Technology

Word options remain in effect, even after Word is closed and reopened

Indicate whether the statement is true or false

Computer Science & Information Technology

A code generator allows users to modify a report easily at any stage of the design process.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology