IT Security/Cryptography/Methods

< IT Security < Cryptography

This lesson covers cryptography methods.

Objectives and Skills

Objectives and skills for the cryptography methods portion of Security+ certification include:[1]

Given a scenario, use appropriate cryptographic methods.
  • WEP vs. WPA/WPA2 and preshared key
  • MD5
  • SHA
  • RIPEMD
  • AES
  • DES
  • 3DES
  • HMAC
  • RSA
  • Diffie-Hellman
  • RC4
  • One-time pads
  • NTLM
  • NTLMv2
  • Blowfish
  • PGP/GPG
  • TwoFish
  • DHE
  • ECDHE
  • CHAP
  • PAP
  • Comparative strengths and performance of algorithms
  • Use of algorithms/protocols with transport encryption
    • SSL
    • TLS
    • IPSec
    • SSH
    • HTTPS
  • Cipher suites
    • Strong vs. weak ciphers
  • Key stretching
    • PBKDF2
    • Bcrypt

Multimedia

  1. Watch YouTube: WEP vs. WPA - CompTIA Security+ SY0-401: 6.2.
  2. Watch YouTube: Cryptographic Hash Functions - CompTIA Security+ SY0-401: 6.2.
  3. Watch YouTube: Symmetric Encryption Ciphers - CompTIA Security+ SY0-401: 6.2.
  4. Watch YouTube: Asymmetric Cryptography Algorithms - CompTIA Security+ SY0-401: 6.2.
  5. Watch YouTube: One-Time Pads - CompTIA Security+ SY0-401: 6.2.
  6. Watch YouTube: NTLM - CompTIA Security+ SY0-401: 6.2.
  7. Watch YouTube: Transport Encryption Algorithms - CompTIA Security+ SY0-401: 6.2.
  8. Watch YouTube: Strong vs. Weak Encryption - CompTIA Security+ SY0-401: 6.2.

References

This article is issued from Wikiversity - version of the Sunday, December 13, 2015. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.