| A | B |
| Confidentiality | ensures only authorized personnel access |
| integrity | detects unauthorized modifications |
| Authentication | Verifies the user or computer |
| Nonrepudiation | user cannot deny sending data. |
| Anti-replay | Prevents interception and sending later |
| brute-force | trying each possible key |
| ciphertext | encrypted text |
| symmetric algorithm | uses the same key for encrypting and decrypting |
| Data Encryption Standard (DES) | uses keys that are 56 bits long |
| Triple DES (3DES) | 168 bits |
| Advanced Encryption Standard (AES) | chosen by the U.S. National Institute for Standards (NIST). |
| International Data Encryption Algorithm (IDEA) | 128-bit keys patented and requires licensing |
| Blowfish | fast algorithm has a variable-length key ranging from 32 bits to 448 bits |
| RC4 stream cipher | modifies key used for WEP |
| hash function | takes data of any length and encrypts to create a fixed-size string of data |
| Secure Hash Algorithm (SHA-1) | 160 bits long used by government agencies |
| Message Digest 4 (MD4) | and Message Digest 5 (MD5 commonly used in applications that do not have to comply with U.S. |
| asymmetric encryption | Public key and private key needed |
| Digital signing | Public key cryptography usually uses a hash |
| Key exchange | exchange key when there is no secure channel or method to create |
| EFS | Combines symmetric and Asymmetric Encryption |