More cards in this set

Card 16

Front

How would you ensure that the list is tamper evident?

Back

Preview of the front of card 16

Card 17

Front

In which data structures can hash pointers be used?

Back

Preview of the front of card 17

Card 18

Front

What is another name for asymmetric cryptography?

Back

Preview of the front of card 18

Card 19

Front

What combination of keys is used in public key cryptography?

Back

Preview of the front of card 19

Card 20

Front

Describe the relationship between a public key, private key and a message.

Back

Preview of the front of card 20

Card 21

Front

Explain the difference between the public key and the private key.

Back

Preview of the front of card 21

Card 22

Front

Explain the process of encryption and decryption in Public Key Cryptography where the sender encrypts with a public key.

Back

Preview of the front of card 22

Card 23

Front

Explain the process of encryption and decryption in Public Key Cryptography where the sender encrypts with their private key.

Back

Preview of the front of card 23

Card 24

Front

Define NON-REPUDIATION.

Back

Preview of the front of card 24

Card 25

Front

List the disadvantages of public key cryptography.

Back

Preview of the front of card 25
View more cards