Review Game Zone
Games
Test
Preview
Back
Match it!
Match it! Select the correct answer from the pull down...Good luck!
The encryption key that is only known to the receiver
The recipient's public key is used to encrypt the data; the recipient's private key is used to decrypt the data.
using multi step authentication
it uses public and private keys to encode/decode data
encryption
a problem that cannot be solved in a reasonable amount of time
it issues certificates to valid websites
public key
private key
Computationally Hard
The recipient's public key is used to encrypt the data; the recipient's private key is used to decrypt the data.
using multi step authentication
it uses public and private keys to encode/decode data
encryption
a problem that cannot be solved in a reasonable amount of time
it issues certificates to valid websites
public key
private key
Which of the following is a way the world wide web keeps data safer
The recipient's public key is used to encrypt the data; the recipient's private key is used to decrypt the data.
using multi step authentication
it uses public and private keys to encode/decode data
encryption
a problem that cannot be solved in a reasonable amount of time
it issues certificates to valid websites
public key
private key
If you use a Vigenere cipher to change the message meet at three to ovci tb bjict this is called
The recipient's public key is used to encrypt the data; the recipient's private key is used to decrypt the data.
using multi step authentication
it uses public and private keys to encode/decode data
encryption
a problem that cannot be solved in a reasonable amount of time
it issues certificates to valid websites
public key
private key
How does asymmetric encryption work on the internet?
The recipient's public key is used to encrypt the data; the recipient's private key is used to decrypt the data.
using multi step authentication
it uses public and private keys to encode/decode data
encryption
a problem that cannot be solved in a reasonable amount of time
it issues certificates to valid websites
public key
private key
The encryption key that is generated and then shared between the sender and receiver
The recipient's public key is used to encrypt the data; the recipient's private key is used to decrypt the data.
using multi step authentication
it uses public and private keys to encode/decode data
encryption
a problem that cannot be solved in a reasonable amount of time
it issues certificates to valid websites
public key
private key
What is one thing people do to keep data safer on the world wide web?
The recipient's public key is used to encrypt the data; the recipient's private key is used to decrypt the data.
using multi step authentication
it uses public and private keys to encode/decode data
encryption
a problem that cannot be solved in a reasonable amount of time
it issues certificates to valid websites
public key
private key
What is a way the world wide web keeps data safer
The recipient's public key is used to encrypt the data; the recipient's private key is used to decrypt the data.
using multi step authentication
it uses public and private keys to encode/decode data
encryption
a problem that cannot be solved in a reasonable amount of time
it issues certificates to valid websites
public key
private key
Check it!