Deck 6: Java Api-Level Security Features

ملء الشاشة (f)
exit full mode
سؤال
8)The ____ package is composed of mostly abstract classes and interfaces that encapsulate security concepts to provide a configurable, fine-grained access-control security architecture.

A) java.security.provider
B) java.jca
C) java.security.jca
D) java.security
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
10)____ implements Java technology version of secure sockets layer (SSL) and transport layer security (TLS) protocols.

A) JSSE
B) java.pkcs
C) java.security.spec
D) java.security.cert
سؤال
18)A ____ is the instruction that describes the set of operations to be performed on the given input in order to produce the cryptographic output.

A) mode
B) transformation
C) provider
D) control
سؤال
3)Before JDK 1.4, certification path validation was done implicitly in signature and signed JAR file verification.
سؤال
17)____ is a block cipher mode in which every plaintext block encrypted with a block cipher is first exclusive-ORed with the previous ciphertext block.

A) CBC
B) ECB
C) OFB
D) CFB
سؤال
20)The basic security in ____ comes from the fact it is relatively easy to multiply two huge prime numbers together to obtain their product, but it is computationally difficult to go the reverse direction.

A) ElGamal
B) DES
C) IDEA
D) RSA
سؤال
16)____ is a block cipher mode in which each possible block of plaintext has a defined corresponding ciphertext value.

A) CBC
B) CFB
C) OFB
D) ECB
سؤال
6)Java cryptography architecture ( JCA) is first introduced in ____.

A) JDK 1.0
B) JDK 1.1
C) JDK 1.4
D) JDK 5.0
سؤال
4)Message digests such as MD2 and MD5 can ensure integrity and confidentiality of a message.
سؤال
5)PK enables secure communication between strangers.
سؤال
2)JCA provides by default a concrete implementation of the java.security package.
سؤال
15)____ allow a user to control how encryption will work in a given cipher.

A) Padding
B) Modes
C) Message digests
D) MACs
سؤال
12)A ____ is used to ensure the integrity of the message when the message is sent from one location to another.

A) certificate path
B) digital signature
C) digital certificate
D) message digest
سؤال
19)____ cryptography enables exchange of secure messages between parties without prior arrangement to exchange keys.

A) Public key
B) Secret key
C) Symmetric
D) Private key
سؤال
7)A(n) ____ refers to a set of packages that supply a concrete implementation of a subset of the cryptography functions used by the Security API.

A) provider
B) extensible access control
C) cryptographic service control
D) consumer
سؤال
1)JCA includes a provider architecture that allows multiple and interoperable cryptography implementations.
سؤال
14)If randomness is needed to enhance security in generating a message digest, a key can be used as part of the message digest generation. This key using algorithm is known as a(n) ____.

A) HCRC
B) MD
C) MAC
D) CRC
سؤال
11)____ API is a set of functions for building and validating a certification path.

A) java.security.cert
B) JSSE
C) CertPath
D) java.security
سؤال
9)____ is a data-encoding scheme that enables binary-encoded data to be converted to printable ASCII characters.

A) PKCS #8
B) PKCS #11
C) Base64
D) DER
سؤال
13)The ____ class provides the functionality of a message digest algorithm.

A) SHA-1
B) MessageDigest
C) java.CRC
D) java.security.MD5
سؤال
31)____________________ is the fixed-length result of a one-way hash of the contents in the message, similar to a cryptographic checksum or cyclic redundancy check (CRC).
سؤال
35)Briefly describe the java.security.cert class.
سؤال
25)____ is a protocol for establishing a secure communication channel between a client and a server.

A) HTTP
B) SHA
C) RSA
D) SSL
سؤال
29)A(n) ____________________ is a transparent representation of the key material that makes up a key.
سؤال
23)The ____ command line tool is a built-in application for keys and certificates management in Java.

A) keytool
B) certtool
C) keystore
D) keygen
سؤال
34)Briefly describe the java.security.acl class.
سؤال
24)A ____, also called certificate chain, is an ordered list of certificates that is used to securely establish the mapping between a public key and a subject.

A) self-signed path
B) certificate verification
C) certification path
D) CA's path
سؤال
33)Briefly describe the Java security API.
سؤال
36)Briefly describe the java.security.interfaces.
سؤال
39)How is the confidentiality of a message kept using secret key cryptography?
سؤال
22)Technically, a ____ is a data structure used in a public key system to bind a particular, authenticated individual to a particular public key.

A) digital certificate
B) digital signature
C) message digest
D) MAC
سؤال
37)Compare the Base64 and DER encoding formats.
سؤال
28)____________________ is the core package that provides the classes and interfaces for the security framework.
سؤال
40)What are the symmetric encryption modes supported by J2SE 5?
سؤال
26)____ provides a framework and a Java implementation for the SSL and TLS protocols.

A) java.security.spec
B) JSSE
C) Java Cipher class
D) java.security.cert
سؤال
21)____ provide(s) a bit pattern (the signature) that proves that a message came from a given party.

A) Message digests
B) Digital certificates
C) Digital signatures
D) RSA
سؤال
27)____________________ is a framework for accessing and developing cryptographic functionality for the Java platform.
سؤال
30)____________________ are an encoding method for a data object such as an X.509 certificate.
سؤال
38)What are the message digest algorithms supported by the Java MessageDigest class?
سؤال
41)What are the padding methods supported by J2SE 5?
سؤال
Match between columns
a set of rules for encoding ASN.1 objects into a sequence of octets
DER
a set of rules for encoding ASN.1 objects into a sequence of octets
Cipher class
a set of rules for encoding ASN.1 objects into a sequence of octets
ASN
a set of rules for encoding ASN.1 objects into a sequence of octets
java.security.spec
a set of rules for encoding ASN.1 objects into a sequence of octets
JCA
a set of rules for encoding ASN.1 objects into a sequence of octets
Message digest
a set of rules for encoding ASN.1 objects into a sequence of octets
java.security.cert
a set of rules for encoding ASN.1 objects into a sequence of octets
Padding
a set of rules for encoding ASN.1 objects into a sequence of octets
Secret key encryption
provides interfaces and classes for key specifications and algorithm parameter specifications
DER
provides interfaces and classes for key specifications and algorithm parameter specifications
Cipher class
provides interfaces and classes for key specifications and algorithm parameter specifications
ASN
provides interfaces and classes for key specifications and algorithm parameter specifications
java.security.spec
provides interfaces and classes for key specifications and algorithm parameter specifications
JCA
provides interfaces and classes for key specifications and algorithm parameter specifications
Message digest
provides interfaces and classes for key specifications and algorithm parameter specifications
java.security.cert
provides interfaces and classes for key specifications and algorithm parameter specifications
Padding
provides interfaces and classes for key specifications and algorithm parameter specifications
Secret key encryption
a language for abstractly describing messages to be exchanged over a variety of networks
DER
a language for abstractly describing messages to be exchanged over a variety of networks
Cipher class
a language for abstractly describing messages to be exchanged over a variety of networks
ASN
a language for abstractly describing messages to be exchanged over a variety of networks
java.security.spec
a language for abstractly describing messages to be exchanged over a variety of networks
JCA
a language for abstractly describing messages to be exchanged over a variety of networks
Message digest
a language for abstractly describing messages to be exchanged over a variety of networks
java.security.cert
a language for abstractly describing messages to be exchanged over a variety of networks
Padding
a language for abstractly describing messages to be exchanged over a variety of networks
Secret key encryption
provides verification of the original content of the message
DER
provides verification of the original content of the message
Cipher class
provides verification of the original content of the message
ASN
provides verification of the original content of the message
java.security.spec
provides verification of the original content of the message
JCA
provides verification of the original content of the message
Message digest
provides verification of the original content of the message
java.security.cert
provides verification of the original content of the message
Padding
provides verification of the original content of the message
Secret key encryption
provides the functionality of a cryptographic cipher for encryption and decryption
DER
provides the functionality of a cryptographic cipher for encryption and decryption
Cipher class
provides the functionality of a cryptographic cipher for encryption and decryption
ASN
provides the functionality of a cryptographic cipher for encryption and decryption
java.security.spec
provides the functionality of a cryptographic cipher for encryption and decryption
JCA
provides the functionality of a cryptographic cipher for encryption and decryption
Message digest
provides the functionality of a cryptographic cipher for encryption and decryption
java.security.cert
provides the functionality of a cryptographic cipher for encryption and decryption
Padding
provides the functionality of a cryptographic cipher for encryption and decryption
Secret key encryption
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
DER
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
Cipher class
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
ASN
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
java.security.spec
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
JCA
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
Message digest
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
java.security.cert
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
Padding
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
Secret key encryption
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
DER
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
Cipher class
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
ASN
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
java.security.spec
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
JCA
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
Message digest
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
java.security.cert
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
Padding
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
Secret key encryption
additional data added to plaintext in order to make it divisible by the cipher's block size
DER
additional data added to plaintext in order to make it divisible by the cipher's block size
Cipher class
additional data added to plaintext in order to make it divisible by the cipher's block size
ASN
additional data added to plaintext in order to make it divisible by the cipher's block size
java.security.spec
additional data added to plaintext in order to make it divisible by the cipher's block size
JCA
additional data added to plaintext in order to make it divisible by the cipher's block size
Message digest
additional data added to plaintext in order to make it divisible by the cipher's block size
java.security.cert
additional data added to plaintext in order to make it divisible by the cipher's block size
Padding
additional data added to plaintext in order to make it divisible by the cipher's block size
Secret key encryption
considered the core API set of the Java programming that is built around the java.security package and its subpackages
DER
considered the core API set of the Java programming that is built around the java.security package and its subpackages
Cipher class
considered the core API set of the Java programming that is built around the java.security package and its subpackages
ASN
considered the core API set of the Java programming that is built around the java.security package and its subpackages
java.security.spec
considered the core API set of the Java programming that is built around the java.security package and its subpackages
JCA
considered the core API set of the Java programming that is built around the java.security package and its subpackages
Message digest
considered the core API set of the Java programming that is built around the java.security package and its subpackages
java.security.cert
considered the core API set of the Java programming that is built around the java.security package and its subpackages
Padding
considered the core API set of the Java programming that is built around the java.security package and its subpackages
Secret key encryption
سؤال
42)How does public key cryptography work?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 6: Java Api-Level Security Features
1
8)The ____ package is composed of mostly abstract classes and interfaces that encapsulate security concepts to provide a configurable, fine-grained access-control security architecture.

A) java.security.provider
B) java.jca
C) java.security.jca
D) java.security
D
2
10)____ implements Java technology version of secure sockets layer (SSL) and transport layer security (TLS) protocols.

A) JSSE
B) java.pkcs
C) java.security.spec
D) java.security.cert
A
3
18)A ____ is the instruction that describes the set of operations to be performed on the given input in order to produce the cryptographic output.

A) mode
B) transformation
C) provider
D) control
B
4
3)Before JDK 1.4, certification path validation was done implicitly in signature and signed JAR file verification.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
17)____ is a block cipher mode in which every plaintext block encrypted with a block cipher is first exclusive-ORed with the previous ciphertext block.

A) CBC
B) ECB
C) OFB
D) CFB
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
20)The basic security in ____ comes from the fact it is relatively easy to multiply two huge prime numbers together to obtain their product, but it is computationally difficult to go the reverse direction.

A) ElGamal
B) DES
C) IDEA
D) RSA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
16)____ is a block cipher mode in which each possible block of plaintext has a defined corresponding ciphertext value.

A) CBC
B) CFB
C) OFB
D) ECB
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
6)Java cryptography architecture ( JCA) is first introduced in ____.

A) JDK 1.0
B) JDK 1.1
C) JDK 1.4
D) JDK 5.0
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
4)Message digests such as MD2 and MD5 can ensure integrity and confidentiality of a message.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
5)PK enables secure communication between strangers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
2)JCA provides by default a concrete implementation of the java.security package.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
15)____ allow a user to control how encryption will work in a given cipher.

A) Padding
B) Modes
C) Message digests
D) MACs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
12)A ____ is used to ensure the integrity of the message when the message is sent from one location to another.

A) certificate path
B) digital signature
C) digital certificate
D) message digest
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
19)____ cryptography enables exchange of secure messages between parties without prior arrangement to exchange keys.

A) Public key
B) Secret key
C) Symmetric
D) Private key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
7)A(n) ____ refers to a set of packages that supply a concrete implementation of a subset of the cryptography functions used by the Security API.

A) provider
B) extensible access control
C) cryptographic service control
D) consumer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
1)JCA includes a provider architecture that allows multiple and interoperable cryptography implementations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
14)If randomness is needed to enhance security in generating a message digest, a key can be used as part of the message digest generation. This key using algorithm is known as a(n) ____.

A) HCRC
B) MD
C) MAC
D) CRC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
11)____ API is a set of functions for building and validating a certification path.

A) java.security.cert
B) JSSE
C) CertPath
D) java.security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
9)____ is a data-encoding scheme that enables binary-encoded data to be converted to printable ASCII characters.

A) PKCS #8
B) PKCS #11
C) Base64
D) DER
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
13)The ____ class provides the functionality of a message digest algorithm.

A) SHA-1
B) MessageDigest
C) java.CRC
D) java.security.MD5
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
31)____________________ is the fixed-length result of a one-way hash of the contents in the message, similar to a cryptographic checksum or cyclic redundancy check (CRC).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
35)Briefly describe the java.security.cert class.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
25)____ is a protocol for establishing a secure communication channel between a client and a server.

A) HTTP
B) SHA
C) RSA
D) SSL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
29)A(n) ____________________ is a transparent representation of the key material that makes up a key.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
23)The ____ command line tool is a built-in application for keys and certificates management in Java.

A) keytool
B) certtool
C) keystore
D) keygen
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
34)Briefly describe the java.security.acl class.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
24)A ____, also called certificate chain, is an ordered list of certificates that is used to securely establish the mapping between a public key and a subject.

A) self-signed path
B) certificate verification
C) certification path
D) CA's path
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
33)Briefly describe the Java security API.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
36)Briefly describe the java.security.interfaces.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
39)How is the confidentiality of a message kept using secret key cryptography?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
22)Technically, a ____ is a data structure used in a public key system to bind a particular, authenticated individual to a particular public key.

A) digital certificate
B) digital signature
C) message digest
D) MAC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
37)Compare the Base64 and DER encoding formats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
28)____________________ is the core package that provides the classes and interfaces for the security framework.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
40)What are the symmetric encryption modes supported by J2SE 5?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
26)____ provides a framework and a Java implementation for the SSL and TLS protocols.

A) java.security.spec
B) JSSE
C) Java Cipher class
D) java.security.cert
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
21)____ provide(s) a bit pattern (the signature) that proves that a message came from a given party.

A) Message digests
B) Digital certificates
C) Digital signatures
D) RSA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
27)____________________ is a framework for accessing and developing cryptographic functionality for the Java platform.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
30)____________________ are an encoding method for a data object such as an X.509 certificate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
38)What are the message digest algorithms supported by the Java MessageDigest class?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
41)What are the padding methods supported by J2SE 5?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Match between columns
a set of rules for encoding ASN.1 objects into a sequence of octets
DER
a set of rules for encoding ASN.1 objects into a sequence of octets
Cipher class
a set of rules for encoding ASN.1 objects into a sequence of octets
ASN
a set of rules for encoding ASN.1 objects into a sequence of octets
java.security.spec
a set of rules for encoding ASN.1 objects into a sequence of octets
JCA
a set of rules for encoding ASN.1 objects into a sequence of octets
Message digest
a set of rules for encoding ASN.1 objects into a sequence of octets
java.security.cert
a set of rules for encoding ASN.1 objects into a sequence of octets
Padding
a set of rules for encoding ASN.1 objects into a sequence of octets
Secret key encryption
provides interfaces and classes for key specifications and algorithm parameter specifications
DER
provides interfaces and classes for key specifications and algorithm parameter specifications
Cipher class
provides interfaces and classes for key specifications and algorithm parameter specifications
ASN
provides interfaces and classes for key specifications and algorithm parameter specifications
java.security.spec
provides interfaces and classes for key specifications and algorithm parameter specifications
JCA
provides interfaces and classes for key specifications and algorithm parameter specifications
Message digest
provides interfaces and classes for key specifications and algorithm parameter specifications
java.security.cert
provides interfaces and classes for key specifications and algorithm parameter specifications
Padding
provides interfaces and classes for key specifications and algorithm parameter specifications
Secret key encryption
a language for abstractly describing messages to be exchanged over a variety of networks
DER
a language for abstractly describing messages to be exchanged over a variety of networks
Cipher class
a language for abstractly describing messages to be exchanged over a variety of networks
ASN
a language for abstractly describing messages to be exchanged over a variety of networks
java.security.spec
a language for abstractly describing messages to be exchanged over a variety of networks
JCA
a language for abstractly describing messages to be exchanged over a variety of networks
Message digest
a language for abstractly describing messages to be exchanged over a variety of networks
java.security.cert
a language for abstractly describing messages to be exchanged over a variety of networks
Padding
a language for abstractly describing messages to be exchanged over a variety of networks
Secret key encryption
provides verification of the original content of the message
DER
provides verification of the original content of the message
Cipher class
provides verification of the original content of the message
ASN
provides verification of the original content of the message
java.security.spec
provides verification of the original content of the message
JCA
provides verification of the original content of the message
Message digest
provides verification of the original content of the message
java.security.cert
provides verification of the original content of the message
Padding
provides verification of the original content of the message
Secret key encryption
provides the functionality of a cryptographic cipher for encryption and decryption
DER
provides the functionality of a cryptographic cipher for encryption and decryption
Cipher class
provides the functionality of a cryptographic cipher for encryption and decryption
ASN
provides the functionality of a cryptographic cipher for encryption and decryption
java.security.spec
provides the functionality of a cryptographic cipher for encryption and decryption
JCA
provides the functionality of a cryptographic cipher for encryption and decryption
Message digest
provides the functionality of a cryptographic cipher for encryption and decryption
java.security.cert
provides the functionality of a cryptographic cipher for encryption and decryption
Padding
provides the functionality of a cryptographic cipher for encryption and decryption
Secret key encryption
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
DER
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
Cipher class
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
ASN
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
java.security.spec
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
JCA
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
Message digest
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
java.security.cert
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
Padding
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
Secret key encryption
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
DER
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
Cipher class
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
ASN
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
java.security.spec
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
JCA
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
Message digest
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
java.security.cert
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
Padding
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
Secret key encryption
additional data added to plaintext in order to make it divisible by the cipher's block size
DER
additional data added to plaintext in order to make it divisible by the cipher's block size
Cipher class
additional data added to plaintext in order to make it divisible by the cipher's block size
ASN
additional data added to plaintext in order to make it divisible by the cipher's block size
java.security.spec
additional data added to plaintext in order to make it divisible by the cipher's block size
JCA
additional data added to plaintext in order to make it divisible by the cipher's block size
Message digest
additional data added to plaintext in order to make it divisible by the cipher's block size
java.security.cert
additional data added to plaintext in order to make it divisible by the cipher's block size
Padding
additional data added to plaintext in order to make it divisible by the cipher's block size
Secret key encryption
considered the core API set of the Java programming that is built around the java.security package and its subpackages
DER
considered the core API set of the Java programming that is built around the java.security package and its subpackages
Cipher class
considered the core API set of the Java programming that is built around the java.security package and its subpackages
ASN
considered the core API set of the Java programming that is built around the java.security package and its subpackages
java.security.spec
considered the core API set of the Java programming that is built around the java.security package and its subpackages
JCA
considered the core API set of the Java programming that is built around the java.security package and its subpackages
Message digest
considered the core API set of the Java programming that is built around the java.security package and its subpackages
java.security.cert
considered the core API set of the Java programming that is built around the java.security package and its subpackages
Padding
considered the core API set of the Java programming that is built around the java.security package and its subpackages
Secret key encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
42)How does public key cryptography work?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.