IT Security/Cryptography/Methods
This lesson covers cryptography methods.
Objectives and Skills
editObjectives and skills for the cryptography methods portion of Security+ certification include:[1]
- Given a scenario, use appropriate cryptographic methods.
- WEP vs. WPA/WPA2 and preshared key
- MD5
- SHA
- RIPEMD
- AES
- DES
- 3DES
- HMAC
- RSA
- Diffie-Hellman
- RC4
- One-time pads
- NTLM
- NTLMv2
- Blowfish
- PGP/GPG
- TwoFish
- DHE
- ECDHE
- CHAP
- PAP
- Comparative strengths and performance of algorithms
- Use of algorithms/protocols with transport encryption
- SSL
- TLS
- IPSec
- SSH
- HTTPS
- Cipher suites
- Strong vs. weak ciphers
- Key stretching
- PBKDF2
- Bcrypt
Readings
editMultimedia
edit- YouTube: WEP vs. WPA - CompTIA Security+ SY0-401: 6.2
- YouTube: Cryptographic Hash Functions - CompTIA Security+ SY0-401: 6.2
- YouTube: Symmetric Encryption Ciphers - CompTIA Security+ SY0-401: 6.2
- YouTube: Asymmetric Cryptography Algorithms - CompTIA Security+ SY0-401: 6.2
- YouTube: One-Time Pads - CompTIA Security+ SY0-401: 6.2
- YouTube: NTLM - CompTIA Security+ SY0-401: 6.2
- YouTube: Transport Encryption Algorithms - CompTIA Security+ SY0-401: 6.2
- YouTube: Strong vs. Weak Encryption - CompTIA Security+ SY0-401: 6.2