Java Games: Flashcards, matching, concentration, and word search.

Security 4 flashcards

AB
Confidentialityensures only authorized personnel access
integritydetects unauthorized modifications
AuthenticationVerifies the user or computer
Nonrepudiationuser cannot deny sending data.
Anti-replayPrevents interception and sending later
brute-forcetrying each possible key
ciphertextencrypted text
symmetric algorithmuses the same key for encrypting and decrypting
Data Encryption Standard (DES)uses keys that are 56 bits long
Triple DES (3DES)168 bits
Advanced Encryption Standard (AES)chosen by the U.S. National Institute for Standards (NIST).
International Data Encryption Algorithm (IDEA)128-bit keys patented and requires licensing
Blowfishfast algorithm has a variable-length key ranging from 32 bits to 448 bits
RC4 stream ciphermodifies key used for WEP
hash functiontakes data of any length and encrypts to create a fixed-size string of data
Secure Hash Algorithm (SHA-1)160 bits long used by government agencies
Message Digest 4 (MD4)and Message Digest 5 (MD5 commonly used in applications that do not have to comply with U.S.
asymmetric encryptionPublic key and private key needed
Digital signingPublic key cryptography usually uses a hash
Key exchangeexchange key when there is no secure channel or method to create
EFSCombines symmetric and Asymmetric Encryption


Medina County Career Center

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities