NETWORK SECURITY
DIGITAL SIGNATURE
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Secure Sockets Layer (SSL)
|
|
Secure File Transfer Protocol (SFTP)
|
|
Pretty Good Privacy (PGP)
|
|
Advanced Encryption Standard (AES)
|
|
Secure Shell (SSH)
|
Detailed explanation-1: -S/MIME. GPG, an implementation of OpenPGP, and an Internet Standard. EMV, EMV Certificate Authority. IPsec. PGP. ZRTP, a secure VoIP protocol. Transport Layer Security standardized by IETF and its predecessor Secure Socket Layer. SILC. More items
Detailed explanation-2: -Common asymmetric encryption algorithms are essential in secure communication and data transmission. Examples of these algorithms include RSA, Diffie-Hellman, and Elliptic Curve Cryptography (ECC).
Detailed explanation-3: -This is the corresponding decryption process (decrypt an encrypted large document using public-key cryptography and symmetric crypto algorithm): Examples of such asymmetric encryption schemes are: RSA-OAEP, RSA-KEM and ECIES-KEM.