What kind of cipher is the Caesar cipher?
What are the four fundamental goals of cryptography?
What is the purpose of confidentiality?
How may a cryptosystem enforce confidentiality?
What is the purpose of integrity?
How to enforce integrity?
What is the purpose of authentication?
How is authentication enforced?
What is the purpose of nonrepudiation?
How is nonrepudiation enforced?
What is the Kerchoff principle?
What is the difference between a private key and public key system?
What are the logical operations that can be performed in boolean mathematics?
What is the importance of the Exclusive OR (XOR) function and how is it performed?
How is the modulo function performed?
What is a one-way function?
What is nonce?
What is initialization vector (IV)?
What is zero-knowledge proof?
What is a transposition cipher?
What is a one-time pad?
What is a running key ciphers
(aka book cipher)?
How does symmetric key algorithms work?
Symmetric key weaknesses:
Symmetric key strength
Formula to calculate the total number of keys required to completely connect n parties using symmetric cryptography
Major strengths of asymmetric key cryptography
Common hashing algorithms
Common symmetric cryptosystems
What is DES?
How does DES work?
What are the 5 modes of operation in DES?
What is Zero-knowledge proof?
Nonce