Skip to content
Get Revising
Search:
Keyword:
Go
Subject
Resource type:
Resource type (all)
Flashcards
Revision cards
Revision notes
Quizzes
Mindmaps
Crosswords
Organise your thinking
Quizsearches
Shared resources
Join
Join Get Revising
Start learning now
Already a member?
Please sign in
Email address
Password
Forgotten your password?
Remember my details
Log in
Create
GCSE
A Level & IB
University
Study planner
Past papers
For teachers
More cards in this set
Card 16
Front
How would you ensure that the list is tamper evident?
Back
Card 17
Front
In which data structures can hash pointers be used?
Back
Card 18
Front
What is another name for asymmetric cryptography?
Back
Card 19
Front
What combination of keys is used in public key cryptography?
Back
Card 20
Front
Describe the relationship between a public key, private key and a message.
Back
Card 21
Front
Explain the difference between the public key and the private key.
Back
Card 22
Front
Explain the process of encryption and decryption in Public Key Cryptography where the sender encrypts with a public key.
Back
Card 23
Front
Explain the process of encryption and decryption in Public Key Cryptography where the sender encrypts with their private key.
Back
Card 24
Front
Define NON-REPUDIATION.
Back
Card 25
Front
List the disadvantages of public key cryptography.
Back
View more cards