Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 10: Cryptography (Providing Confidentiality with Encryption (Block…
Chapter 10: Cryptography
Providing Integrity with Hashing
Hashing
Passwords
Hashing Algorithms
Message Digest 5 (MD5)
Secure Hash Algorithm (SHA)
Hash-Based Message Authentication Code (HMAC)
Providing Confidentiality with Encryption
Symmetric Encryption
Remote Authentication Dial-In User Service (RADIUS)
Diffie-Helman
Elliptic Curve Diffie-Hellman Ephemeral (ECDHE)
Asymmetric Encryption
RSA
Block Ciphers
Advanced Encryption Standard (AES)
Twofish
Data Encryption Standard (DES)
Triple DES (3DES)
Blowfish
Stream Ciphers
Elliptic Curve Cryptography (ECC)
Steganography
Transport Encryption Methods
IPsec
HMAC
AES
3DES
TLS
Replacement for SSL.
TLS & SSL both require certificates issued from a CA.
SSL
Using Cryptographic Protocols
When using digital signatures with email
When encrypting email
When encrypting web site traffic with SSL or TLS
Exploring PKI Components
Public Key Infrastructure (PKI)
Certificate Authority (CA)