Erstellt von DJ Perrone
vor fast 7 Jahre
|
||
What is key stretching
What is hashing
Message Digest (MD) 2 Characteristics
Message Digest (MD) 4 Characteristics
Message Digest (MD) 5 Characteristics
Message Digest (MD) 6
How many Secure Hash Algorithm (SHA) versions are there?
SHA-0/1 Characteristics
SHA-2 Family Characteristics
SHA-224 Characteristics
SHA-256 Characteristics
SHA-384 Characteristics
SHA-512 Characteristics
SHA-512/224 Characteristics
SHA-512/256 Characteristics
DES Characteristics
3DES Characteristics
AES Characteristics
IDEA Characteristics
Skipjack Characteristics
Blowfish Characteristics
Twofish Characteristics
RC4 Characteristics
RC5 Characteristics
RC6 Characteristics
What is an asymmetric algorithm?
What does an asymmetric algorithm provide?
What are some asymmetric algorithms?
What is entropy?
What is diffusion?
What is confusion?
What is non-repudiation?
What is confidentiality?
What is integrity?
What is a wildcard certificate?
What is OCSP and how does it work?
What is the CRL and how does it work?
What is an advantage of a stream ciphers?
What is an advantage of a block cipher?
What are the 5 modes of DES?
What is ECB?
What is CBC?
What is CFB?
What is OFB?
What is CTR?
What are 4 3DES modes?
What is 3DES-EEE3?
What is 3DES-EDE3?
What is 3DES-EEE2?
What is 3DES-EDE2?
What are some strengths of symmetric algorithms?
What are some weaknesses of symmetric algorithms?
What are some strengths of asymmetric algorithms?
What are some weaknesses of asymmetric algorithms?
What is DRM?
What is GPG?
What is PGP?
What is SSL/TLS and what are two ways it can be implemented?
What is an SSL Portal VPN?
What is an SSL Tunnel VPN?
Which SSL version must be used on client side authentication?
What S/MIME?
What is diffusion?
How is diffusion carried out?
What are some popular asymmetric algorithms?
What are some popular symmetric algorithms?
What is key clustering?
What is cryptanalysis?
What is PFS and what is it used for?