6.0 Cryptography


6.1 Summarize general cryptography concepts

  • Symmetric vs. asymmetric
  • Fundamental differences and encryption methods
    • Block vs. stream
  • Transport encryption
  • Non-repudiation
  • Hashing
  • Key escrow
  • Steganography
  • Digital signatures
  • Use of proven technologies
  • Elliptic curve and quantum cryptography

6.2 Use and apply appropriate cryptographic tools and products

  • WEP vs. WPA/WPA2 and preshared key
  • MD5
  • SHA
  • RIPEMD
  • AES
  • DES
  • 3DES
  • HMAC
  • RSA
  • RC4
  • One-time-pads
  • CHAP
  • PAP
  • NTLM
  • NTLMv2
  • Blowfish
  • PGP/GPG
  • Whole disk encryption
  • TwoFish
  • Comparative strengths of algorithms
  • Use of algorithms with transport encryption
    • SSL
    • TLS
    • IPSec
    • SSH
    • HTTPS

6.3 Explain the core concepts of public key infrastructure

  • Certificate authorities and digital certificates
    • PKI
    • Recovery agent
    • Public key
    • Private key
    • Registration
    • Key escrow
    • Trust models

6.4 Implement PKI, certificate management and associated components

  • Certificate authorities and digital certificates
    • PKI
    • Recovery agent
    • Public key
    • Private keys
    • Registration
    • Key escrow
    • Trust models
Recommended

 





Associates