|
6.0 Cryptography
6.1 Summarize general cryptography concepts
- Symmetric vs. asymmetric
- Fundamental differences and encryption methods
- Transport encryption
- Non-repudiation
- Hashing
- Key escrow
- Steganography
- Digital signatures
- Use of proven technologies
- Elliptic curve and quantum cryptography
- WEP vs. WPA/WPA2 and preshared key
- MD5
- SHA
- RIPEMD
- AES
- DES
- 3DES
- HMAC
- RSA
- RC4
- One-time-pads
- CHAP
- PAP
- NTLM
- NTLMv2
- Blowfish
- PGP/GPG
- Whole disk encryption
- TwoFish
- Comparative strengths of algorithms
- Use of algorithms with transport encryption
6.3 Explain the core concepts of public key infrastructure
- Certificate authorities and digital certificates
- PKI
- Recovery agent
- Public key
- Private key
- Registration
- Key escrow
- Trust models
6.4 Implement PKI, certificate management and associated components
- Certificate authorities and digital certificates
- PKI
- Recovery agent
- Public key
- Private keys
- Registration
- Key escrow
- Trust models
|
|
|