Security and Intended Use

0.0(0)
studied byStudied by 0 people
0.0(0)
linked notesView linked note
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/3

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

4 Terms

1
New cards

Symmetric Key System

An encryption method where the same algorithmic key is used to both encrypt and decrypt messages, also known as secret key encryption.

2
New cards

Asymmetric Key System

An encryption method that uses different keys for encryption and decryption, such as public-key cryptography where a public key encrypts messages and a private key decrypts them.

3
New cards

Public-key Cryptography

An example of an asymmetric key system where a public key is used to encrypt messages, and only the corresponding private key can decrypt them.

4
New cards

Secure Sockets Layer (SSL)

An asymmetric key system used for secure message passing, indicated by a padlock icon in the browser's address bar, ensuring encrypted communication and validation of ownership through digital certificates issued by certificate authorities (CAs).