1 | 15 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | 16 | ||||||||||||||||||||||||
17 | |||||||||||||||||||||||||
13 | 4 | ||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
14 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
10 | 9 | ||||||||||||||||||||||||
11/12 |
1. Preventing the sender from denying sending a message in asymmetric encryption.
2. A cryptographic key that is kept secret and used for decryption or creating digital signatures.
3. A cryptographic system that uses a pair of keys for encryption: a public key for encrypting data and a private key for decrypting data.
4. A cryptographic technique that uses the same key to encrypt and decrypt data.
5. A type of symmetric encryption algorithm that operates on fixed-length blocks of data.
6. Ensuring that information remains confidential in asymmetric encryption.
7. A popular asymmetric encryption algorithm used for secure communication and data protection.
8. Verifying the identity of the sender or recipient in asymmetric encryption.
9. The process of securely sharing cryptographic keys between parties to enable secure communication.
10. The process of invalidating a digital certificate before its expiration date due to compromise or other reasons.
11. A cryptographic technique used to verify the authenticity of digital messages or documents.
12. A way to ensure the authenticity of a message sent using asymmetric encryption.
13. A self-signed certificate issued by a Certificate Authority that establishes trust in the entire certificate chain.
14. The process of converting ciphertext back into plaintext using a decryption algorithm.
15. A cryptographic key that can be freely distributed and is used for encryption or digital signatures.
16. The process of converting plaintext into ciphertext using an encryption algorithm.
17. An electronic document issued by a Certificate Authority that binds a public key to an individual or entity.