Deck 6: Java Api-Level Security Features

Full screen (f)
exit full mode
Question
8)The ____ package is composed of mostly abstract classes and interfaces that encapsulate security concepts to provide a configurable, fine-grained access-control security architecture.

A) java.security.provider
B) java.jca
C) java.security.jca
D) java.security
Use Space or
up arrow
down arrow
to flip the card.
Question
10)____ implements Java technology version of secure sockets layer (SSL) and transport layer security (TLS) protocols.

A) JSSE
B) java.pkcs
C) java.security.spec
D) java.security.cert
Question
18)A ____ is the instruction that describes the set of operations to be performed on the given input in order to produce the cryptographic output.

A) mode
B) transformation
C) provider
D) control
Question
3)Before JDK 1.4, certification path validation was done implicitly in signature and signed JAR file verification.
Question
17)____ is a block cipher mode in which every plaintext block encrypted with a block cipher is first exclusive-ORed with the previous ciphertext block.

A) CBC
B) ECB
C) OFB
D) CFB
Question
20)The basic security in ____ comes from the fact it is relatively easy to multiply two huge prime numbers together to obtain their product, but it is computationally difficult to go the reverse direction.

A) ElGamal
B) DES
C) IDEA
D) RSA
Question
16)____ is a block cipher mode in which each possible block of plaintext has a defined corresponding ciphertext value.

A) CBC
B) CFB
C) OFB
D) ECB
Question
6)Java cryptography architecture ( JCA) is first introduced in ____.

A) JDK 1.0
B) JDK 1.1
C) JDK 1.4
D) JDK 5.0
Question
4)Message digests such as MD2 and MD5 can ensure integrity and confidentiality of a message.
Question
5)PK enables secure communication between strangers.
Question
2)JCA provides by default a concrete implementation of the java.security package.
Question
15)____ allow a user to control how encryption will work in a given cipher.

A) Padding
B) Modes
C) Message digests
D) MACs
Question
12)A ____ is used to ensure the integrity of the message when the message is sent from one location to another.

A) certificate path
B) digital signature
C) digital certificate
D) message digest
Question
19)____ cryptography enables exchange of secure messages between parties without prior arrangement to exchange keys.

A) Public key
B) Secret key
C) Symmetric
D) Private key
Question
7)A(n) ____ refers to a set of packages that supply a concrete implementation of a subset of the cryptography functions used by the Security API.

A) provider
B) extensible access control
C) cryptographic service control
D) consumer
Question
1)JCA includes a provider architecture that allows multiple and interoperable cryptography implementations.
Question
14)If randomness is needed to enhance security in generating a message digest, a key can be used as part of the message digest generation. This key using algorithm is known as a(n) ____.

A) HCRC
B) MD
C) MAC
D) CRC
Question
11)____ API is a set of functions for building and validating a certification path.

A) java.security.cert
B) JSSE
C) CertPath
D) java.security
Question
9)____ is a data-encoding scheme that enables binary-encoded data to be converted to printable ASCII characters.

A) PKCS #8
B) PKCS #11
C) Base64
D) DER
Question
13)The ____ class provides the functionality of a message digest algorithm.

A) SHA-1
B) MessageDigest
C) java.CRC
D) java.security.MD5
Question
31)____________________ is the fixed-length result of a one-way hash of the contents in the message, similar to a cryptographic checksum or cyclic redundancy check (CRC).
Question
35)Briefly describe the java.security.cert class.
Question
25)____ is a protocol for establishing a secure communication channel between a client and a server.

A) HTTP
B) SHA
C) RSA
D) SSL
Question
29)A(n) ____________________ is a transparent representation of the key material that makes up a key.
Question
23)The ____ command line tool is a built-in application for keys and certificates management in Java.

A) keytool
B) certtool
C) keystore
D) keygen
Question
34)Briefly describe the java.security.acl class.
Question
24)A ____, also called certificate chain, is an ordered list of certificates that is used to securely establish the mapping between a public key and a subject.

A) self-signed path
B) certificate verification
C) certification path
D) CA's path
Question
33)Briefly describe the Java security API.
Question
36)Briefly describe the java.security.interfaces.
Question
39)How is the confidentiality of a message kept using secret key cryptography?
Question
22)Technically, a ____ is a data structure used in a public key system to bind a particular, authenticated individual to a particular public key.

A) digital certificate
B) digital signature
C) message digest
D) MAC
Question
37)Compare the Base64 and DER encoding formats.
Question
28)____________________ is the core package that provides the classes and interfaces for the security framework.
Question
40)What are the symmetric encryption modes supported by J2SE 5?
Question
26)____ provides a framework and a Java implementation for the SSL and TLS protocols.

A) java.security.spec
B) JSSE
C) Java Cipher class
D) java.security.cert
Question
21)____ provide(s) a bit pattern (the signature) that proves that a message came from a given party.

A) Message digests
B) Digital certificates
C) Digital signatures
D) RSA
Question
27)____________________ is a framework for accessing and developing cryptographic functionality for the Java platform.
Question
30)____________________ are an encoding method for a data object such as an X.509 certificate.
Question
38)What are the message digest algorithms supported by the Java MessageDigest class?
Question
41)What are the padding methods supported by J2SE 5?
Question
Match between columns
a set of rules for encoding ASN.1 objects into a sequence of octets
DER
a set of rules for encoding ASN.1 objects into a sequence of octets
Cipher class
a set of rules for encoding ASN.1 objects into a sequence of octets
ASN
a set of rules for encoding ASN.1 objects into a sequence of octets
java.security.spec
a set of rules for encoding ASN.1 objects into a sequence of octets
JCA
a set of rules for encoding ASN.1 objects into a sequence of octets
Message digest
a set of rules for encoding ASN.1 objects into a sequence of octets
java.security.cert
a set of rules for encoding ASN.1 objects into a sequence of octets
Padding
a set of rules for encoding ASN.1 objects into a sequence of octets
Secret key encryption
provides interfaces and classes for key specifications and algorithm parameter specifications
DER
provides interfaces and classes for key specifications and algorithm parameter specifications
Cipher class
provides interfaces and classes for key specifications and algorithm parameter specifications
ASN
provides interfaces and classes for key specifications and algorithm parameter specifications
java.security.spec
provides interfaces and classes for key specifications and algorithm parameter specifications
JCA
provides interfaces and classes for key specifications and algorithm parameter specifications
Message digest
provides interfaces and classes for key specifications and algorithm parameter specifications
java.security.cert
provides interfaces and classes for key specifications and algorithm parameter specifications
Padding
provides interfaces and classes for key specifications and algorithm parameter specifications
Secret key encryption
a language for abstractly describing messages to be exchanged over a variety of networks
DER
a language for abstractly describing messages to be exchanged over a variety of networks
Cipher class
a language for abstractly describing messages to be exchanged over a variety of networks
ASN
a language for abstractly describing messages to be exchanged over a variety of networks
java.security.spec
a language for abstractly describing messages to be exchanged over a variety of networks
JCA
a language for abstractly describing messages to be exchanged over a variety of networks
Message digest
a language for abstractly describing messages to be exchanged over a variety of networks
java.security.cert
a language for abstractly describing messages to be exchanged over a variety of networks
Padding
a language for abstractly describing messages to be exchanged over a variety of networks
Secret key encryption
provides verification of the original content of the message
DER
provides verification of the original content of the message
Cipher class
provides verification of the original content of the message
ASN
provides verification of the original content of the message
java.security.spec
provides verification of the original content of the message
JCA
provides verification of the original content of the message
Message digest
provides verification of the original content of the message
java.security.cert
provides verification of the original content of the message
Padding
provides verification of the original content of the message
Secret key encryption
provides the functionality of a cryptographic cipher for encryption and decryption
DER
provides the functionality of a cryptographic cipher for encryption and decryption
Cipher class
provides the functionality of a cryptographic cipher for encryption and decryption
ASN
provides the functionality of a cryptographic cipher for encryption and decryption
java.security.spec
provides the functionality of a cryptographic cipher for encryption and decryption
JCA
provides the functionality of a cryptographic cipher for encryption and decryption
Message digest
provides the functionality of a cryptographic cipher for encryption and decryption
java.security.cert
provides the functionality of a cryptographic cipher for encryption and decryption
Padding
provides the functionality of a cryptographic cipher for encryption and decryption
Secret key encryption
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
DER
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
Cipher class
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
ASN
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
java.security.spec
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
JCA
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
Message digest
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
java.security.cert
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
Padding
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
Secret key encryption
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
DER
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
Cipher class
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
ASN
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
java.security.spec
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
JCA
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
Message digest
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
java.security.cert
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
Padding
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
Secret key encryption
additional data added to plaintext in order to make it divisible by the cipher's block size
DER
additional data added to plaintext in order to make it divisible by the cipher's block size
Cipher class
additional data added to plaintext in order to make it divisible by the cipher's block size
ASN
additional data added to plaintext in order to make it divisible by the cipher's block size
java.security.spec
additional data added to plaintext in order to make it divisible by the cipher's block size
JCA
additional data added to plaintext in order to make it divisible by the cipher's block size
Message digest
additional data added to plaintext in order to make it divisible by the cipher's block size
java.security.cert
additional data added to plaintext in order to make it divisible by the cipher's block size
Padding
additional data added to plaintext in order to make it divisible by the cipher's block size
Secret key encryption
considered the core API set of the Java programming that is built around the java.security package and its subpackages
DER
considered the core API set of the Java programming that is built around the java.security package and its subpackages
Cipher class
considered the core API set of the Java programming that is built around the java.security package and its subpackages
ASN
considered the core API set of the Java programming that is built around the java.security package and its subpackages
java.security.spec
considered the core API set of the Java programming that is built around the java.security package and its subpackages
JCA
considered the core API set of the Java programming that is built around the java.security package and its subpackages
Message digest
considered the core API set of the Java programming that is built around the java.security package and its subpackages
java.security.cert
considered the core API set of the Java programming that is built around the java.security package and its subpackages
Padding
considered the core API set of the Java programming that is built around the java.security package and its subpackages
Secret key encryption
Question
42)How does public key cryptography work?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Java Api-Level Security Features
1
8)The ____ package is composed of mostly abstract classes and interfaces that encapsulate security concepts to provide a configurable, fine-grained access-control security architecture.

A) java.security.provider
B) java.jca
C) java.security.jca
D) java.security
D
2
10)____ implements Java technology version of secure sockets layer (SSL) and transport layer security (TLS) protocols.

A) JSSE
B) java.pkcs
C) java.security.spec
D) java.security.cert
A
3
18)A ____ is the instruction that describes the set of operations to be performed on the given input in order to produce the cryptographic output.

A) mode
B) transformation
C) provider
D) control
B
4
3)Before JDK 1.4, certification path validation was done implicitly in signature and signed JAR file verification.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
17)____ is a block cipher mode in which every plaintext block encrypted with a block cipher is first exclusive-ORed with the previous ciphertext block.

A) CBC
B) ECB
C) OFB
D) CFB
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
20)The basic security in ____ comes from the fact it is relatively easy to multiply two huge prime numbers together to obtain their product, but it is computationally difficult to go the reverse direction.

A) ElGamal
B) DES
C) IDEA
D) RSA
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
16)____ is a block cipher mode in which each possible block of plaintext has a defined corresponding ciphertext value.

A) CBC
B) CFB
C) OFB
D) ECB
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
6)Java cryptography architecture ( JCA) is first introduced in ____.

A) JDK 1.0
B) JDK 1.1
C) JDK 1.4
D) JDK 5.0
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
4)Message digests such as MD2 and MD5 can ensure integrity and confidentiality of a message.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
5)PK enables secure communication between strangers.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
2)JCA provides by default a concrete implementation of the java.security package.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
15)____ allow a user to control how encryption will work in a given cipher.

A) Padding
B) Modes
C) Message digests
D) MACs
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
12)A ____ is used to ensure the integrity of the message when the message is sent from one location to another.

A) certificate path
B) digital signature
C) digital certificate
D) message digest
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
19)____ cryptography enables exchange of secure messages between parties without prior arrangement to exchange keys.

A) Public key
B) Secret key
C) Symmetric
D) Private key
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
7)A(n) ____ refers to a set of packages that supply a concrete implementation of a subset of the cryptography functions used by the Security API.

A) provider
B) extensible access control
C) cryptographic service control
D) consumer
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
1)JCA includes a provider architecture that allows multiple and interoperable cryptography implementations.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
14)If randomness is needed to enhance security in generating a message digest, a key can be used as part of the message digest generation. This key using algorithm is known as a(n) ____.

A) HCRC
B) MD
C) MAC
D) CRC
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
11)____ API is a set of functions for building and validating a certification path.

A) java.security.cert
B) JSSE
C) CertPath
D) java.security
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
9)____ is a data-encoding scheme that enables binary-encoded data to be converted to printable ASCII characters.

A) PKCS #8
B) PKCS #11
C) Base64
D) DER
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
13)The ____ class provides the functionality of a message digest algorithm.

A) SHA-1
B) MessageDigest
C) java.CRC
D) java.security.MD5
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
31)____________________ is the fixed-length result of a one-way hash of the contents in the message, similar to a cryptographic checksum or cyclic redundancy check (CRC).
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
35)Briefly describe the java.security.cert class.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
25)____ is a protocol for establishing a secure communication channel between a client and a server.

A) HTTP
B) SHA
C) RSA
D) SSL
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
29)A(n) ____________________ is a transparent representation of the key material that makes up a key.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
23)The ____ command line tool is a built-in application for keys and certificates management in Java.

A) keytool
B) certtool
C) keystore
D) keygen
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
34)Briefly describe the java.security.acl class.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
24)A ____, also called certificate chain, is an ordered list of certificates that is used to securely establish the mapping between a public key and a subject.

A) self-signed path
B) certificate verification
C) certification path
D) CA's path
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
33)Briefly describe the Java security API.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
36)Briefly describe the java.security.interfaces.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
39)How is the confidentiality of a message kept using secret key cryptography?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
22)Technically, a ____ is a data structure used in a public key system to bind a particular, authenticated individual to a particular public key.

A) digital certificate
B) digital signature
C) message digest
D) MAC
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
37)Compare the Base64 and DER encoding formats.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
28)____________________ is the core package that provides the classes and interfaces for the security framework.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
40)What are the symmetric encryption modes supported by J2SE 5?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
26)____ provides a framework and a Java implementation for the SSL and TLS protocols.

A) java.security.spec
B) JSSE
C) Java Cipher class
D) java.security.cert
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
21)____ provide(s) a bit pattern (the signature) that proves that a message came from a given party.

A) Message digests
B) Digital certificates
C) Digital signatures
D) RSA
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
27)____________________ is a framework for accessing and developing cryptographic functionality for the Java platform.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
30)____________________ are an encoding method for a data object such as an X.509 certificate.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
38)What are the message digest algorithms supported by the Java MessageDigest class?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
41)What are the padding methods supported by J2SE 5?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
a set of rules for encoding ASN.1 objects into a sequence of octets
DER
a set of rules for encoding ASN.1 objects into a sequence of octets
Cipher class
a set of rules for encoding ASN.1 objects into a sequence of octets
ASN
a set of rules for encoding ASN.1 objects into a sequence of octets
java.security.spec
a set of rules for encoding ASN.1 objects into a sequence of octets
JCA
a set of rules for encoding ASN.1 objects into a sequence of octets
Message digest
a set of rules for encoding ASN.1 objects into a sequence of octets
java.security.cert
a set of rules for encoding ASN.1 objects into a sequence of octets
Padding
a set of rules for encoding ASN.1 objects into a sequence of octets
Secret key encryption
provides interfaces and classes for key specifications and algorithm parameter specifications
DER
provides interfaces and classes for key specifications and algorithm parameter specifications
Cipher class
provides interfaces and classes for key specifications and algorithm parameter specifications
ASN
provides interfaces and classes for key specifications and algorithm parameter specifications
java.security.spec
provides interfaces and classes for key specifications and algorithm parameter specifications
JCA
provides interfaces and classes for key specifications and algorithm parameter specifications
Message digest
provides interfaces and classes for key specifications and algorithm parameter specifications
java.security.cert
provides interfaces and classes for key specifications and algorithm parameter specifications
Padding
provides interfaces and classes for key specifications and algorithm parameter specifications
Secret key encryption
a language for abstractly describing messages to be exchanged over a variety of networks
DER
a language for abstractly describing messages to be exchanged over a variety of networks
Cipher class
a language for abstractly describing messages to be exchanged over a variety of networks
ASN
a language for abstractly describing messages to be exchanged over a variety of networks
java.security.spec
a language for abstractly describing messages to be exchanged over a variety of networks
JCA
a language for abstractly describing messages to be exchanged over a variety of networks
Message digest
a language for abstractly describing messages to be exchanged over a variety of networks
java.security.cert
a language for abstractly describing messages to be exchanged over a variety of networks
Padding
a language for abstractly describing messages to be exchanged over a variety of networks
Secret key encryption
provides verification of the original content of the message
DER
provides verification of the original content of the message
Cipher class
provides verification of the original content of the message
ASN
provides verification of the original content of the message
java.security.spec
provides verification of the original content of the message
JCA
provides verification of the original content of the message
Message digest
provides verification of the original content of the message
java.security.cert
provides verification of the original content of the message
Padding
provides verification of the original content of the message
Secret key encryption
provides the functionality of a cryptographic cipher for encryption and decryption
DER
provides the functionality of a cryptographic cipher for encryption and decryption
Cipher class
provides the functionality of a cryptographic cipher for encryption and decryption
ASN
provides the functionality of a cryptographic cipher for encryption and decryption
java.security.spec
provides the functionality of a cryptographic cipher for encryption and decryption
JCA
provides the functionality of a cryptographic cipher for encryption and decryption
Message digest
provides the functionality of a cryptographic cipher for encryption and decryption
java.security.cert
provides the functionality of a cryptographic cipher for encryption and decryption
Padding
provides the functionality of a cryptographic cipher for encryption and decryption
Secret key encryption
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
DER
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
Cipher class
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
ASN
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
java.security.spec
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
JCA
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
Message digest
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
java.security.cert
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
Padding
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
Secret key encryption
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
DER
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
Cipher class
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
ASN
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
java.security.spec
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
JCA
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
Message digest
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
java.security.cert
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
Padding
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
Secret key encryption
additional data added to plaintext in order to make it divisible by the cipher's block size
DER
additional data added to plaintext in order to make it divisible by the cipher's block size
Cipher class
additional data added to plaintext in order to make it divisible by the cipher's block size
ASN
additional data added to plaintext in order to make it divisible by the cipher's block size
java.security.spec
additional data added to plaintext in order to make it divisible by the cipher's block size
JCA
additional data added to plaintext in order to make it divisible by the cipher's block size
Message digest
additional data added to plaintext in order to make it divisible by the cipher's block size
java.security.cert
additional data added to plaintext in order to make it divisible by the cipher's block size
Padding
additional data added to plaintext in order to make it divisible by the cipher's block size
Secret key encryption
considered the core API set of the Java programming that is built around the java.security package and its subpackages
DER
considered the core API set of the Java programming that is built around the java.security package and its subpackages
Cipher class
considered the core API set of the Java programming that is built around the java.security package and its subpackages
ASN
considered the core API set of the Java programming that is built around the java.security package and its subpackages
java.security.spec
considered the core API set of the Java programming that is built around the java.security package and its subpackages
JCA
considered the core API set of the Java programming that is built around the java.security package and its subpackages
Message digest
considered the core API set of the Java programming that is built around the java.security package and its subpackages
java.security.cert
considered the core API set of the Java programming that is built around the java.security package and its subpackages
Padding
considered the core API set of the Java programming that is built around the java.security package and its subpackages
Secret key encryption
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
42)How does public key cryptography work?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.