Hashing
Hashing is an algorithm that calculates a fixed-size bit string value from a file.
Cryptography
cryptography provides secure communication or end-to-end encryption
Authentication
Authentication provides a method of identifying a user
Symmetric encryption
Uses same cryptographic key to both encrypt and decrypt information
MD5
a hash function producing a 128-bit hash value to encrypt a message
RSA Algorithm
a public key, and private keys are used for encryption, different from the public key only known to the recipient, which is used for decryption
Authorization
The authorization process determines whether the user has the required permissions to issue any commands.
Asymmetric symmetric
uses two different cryptographic keys: a public key and a private key
DES Algorithm
The DES Algorithm is a block cipher that uses symmetric keys to convert 64-bit plaintext blocks into 48-bit ciphertext blocks.
Accounting
Accounting keeps track of user activity while users are logged in to a network
Difference between symmetric encryption and Asymmetric encryption
The difference between them is that symmetrical encryption uses one key, while asymmetric encryption uses two different keys
Hashing
Hashes are the output of a hashing algorithm like MD5 (Message Digest 5) or SHA (Secure Hash Algorithm) and process is known as hashing
Ciphertext
Ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher.
Steganography
representing information within another message or physical object, the presence of the information is not evident to human inspection