Basic
Public Key Encryption
Key Management
Wireless LAN
IT Act
100

Is an electronic device that takes input and processes and gives out put

Computer

100

Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys:

 Public key Encryption

100

Key management refers to management of cryptographic keys in a cryptosystem.

key management.

100

 computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area such as a home, school, computer laboratory, campus, or office building.

wireless lan

100

Whoever with the intent of cause or knowing that is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means .

Hacking

200

cryptographic system that uses the same key to encrypt and decrypt data. This means that all parties involved have to know the key to be able to communicate securely – that is, decrypt encrypted messages to read them and encrypt messages they want to send.

secret key cryptography

200

cryptographic attack that exploits the mathematics behind the birthday problem in probability theory

Birthday Attack

200

omputer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.

Kerberos