Hashing
Cryptography
AAA
Encryption
100

Hashing

Hashing is an algorithm that calculates a fixed-size bit string value from a file.

100

Cryptography

cryptography provides secure communication or end-to-end encryption

100

Authentication

Authentication provides a method of identifying a user

100

Symmetric encryption

Uses same cryptographic key to both encrypt and decrypt information

200

MD5

 a hash function producing a 128-bit hash value to encrypt a message

200

RSA Algorithm

a public key, and private keys are used for encryption, different from the public key only known to the recipient, which is used for decryption

200

Authorization

The authorization process determines whether the user has the required permissions to issue any commands.

200

Asymmetric symmetric

uses two different cryptographic keys: a public key and a private key

300

DES Algorithm

The DES Algorithm is a block cipher that uses symmetric keys to convert 64-bit plaintext blocks into 48-bit ciphertext blocks.

300

Accounting

Accounting keeps track of user activity while users are logged in to a network

300

Difference between symmetric encryption and Asymmetric encryption

The difference between them is that symmetrical encryption uses one key, while asymmetric encryption uses two different keys

400

Hashing

Hashes are the output of a hashing algorithm like MD5 (Message Digest 5) or SHA (Secure Hash Algorithm) and process is known as hashing

400

Ciphertext

Ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher.

500

Steganography

representing information within another message or physical object, the presence of the information is not evident to human inspection

M
e
n
u