Menu Search Sign up

Cryptography

This area covers the following topics:

Symmetric vs. Asymmetric
• Session keys
• In-band vs. out-of-band key exchange
• Block vs stream encryption methods
• Transport encryption
• Non-repudiation
• Hashing
• Key escrow
• Steganography
• Digital signatures
• Use of proven technologies
• Elliptic curve and quantum cryptography
• Ephemeral key
• Perfect forward secrecy

Cryptographic Methods
• WEP vs WPA/WPA2 and preshared key
• MD5
• SHA
• RIPEMD
• AES
• DES
• 3DES
• HMAC
• RSA
• Diffie-Hellman
• RC4
• One-time pads
• NTLM
• NTLMv2
• Blowfish
• PGP/GPG
• TwoFish
• DHE
• ECDHE
• CHAP
• PAP
• Comparative strengths and performance of algorithms
• Use of algorithms/protocols with transport encryption (SSL, TLS, IPSec, SSH, HTTPS, Cipher suites, Strong vs. weak ciphers)
• Key stretching (PBKDF2, Bcrypt)

PKI & Certificate Management
• Certificate authorities and digital certificates (CA, CRLs, OCSP, CSR,
• PKI
• Recovery agent
• Public key
• Private key
• Registration
• Key escrow
• Trust models