Symmetric Encryption, One key is used for encryption and decryption, Asymmetric Encryption, Public and private key pair used for encryption and decryption, Hashing, Converts data into a fixed-size value (fingerprint), HMAC, Hashing with a secret key for data integrity, Digital Signature, Validates authenticity and integrity of a message, TLS, Protocol that encrypts data in transit, HTTPS, Secure version of HTTP using TLS, VPN, Virtual Private Network – secure connection over the internet, IPSec, Suite used to secure IP communications, Certificate Authority (CA), Entity that issues digital certificates, Digital Certificate, Electronic file used to prove identity of an entity, Key Exchange, Process for securely sharing encryption keys, Diffie-Hellman, Method of exchanging keys securely over public networks, ECC (Elliptic Curve Cryptography), Cryptography using elliptic curves for strong encryption.
0%
Cryptography & PKI
Share
Share
Share
by
Danielpena4
Edit Content
Print
Embed
More
Assignments
Leaderboard
Show more
Show less
This leaderboard is currently private. Click
Share
to make it public.
This leaderboard has been disabled by the resource owner.
This leaderboard is disabled as your options are different to the resource owner.
Revert Options
Match up
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
)
Open results
Copy link
QR code
Delete
Continue editing:
?