IT Security/Cryptography/Methods

From Wikiversity
Jump to navigation Jump to search

This lesson covers cryptography methods.

Objectives and Skills[edit | edit source]

Objectives and skills for the cryptography methods portion of Security+ certification include:[1]

Given a scenario, use appropriate cryptographic methods.
  • WEP vs. WPA/WPA2 and preshared key
  • MD5
  • SHA
  • RIPEMD
  • AES
  • DES
  • 3DES
  • HMAC
  • RSA
  • Diffie-Hellman
  • RC4
  • One-time pads
  • NTLM
  • NTLMv2
  • Blowfish
  • PGP/GPG
  • TwoFish
  • DHE
  • ECDHE
  • CHAP
  • PAP
  • Comparative strengths and performance of algorithms
  • Use of algorithms/protocols with transport encryption
    • SSL
    • TLS
    • IPSec
    • SSH
    • HTTPS
  • Cipher suites
    • Strong vs. weak ciphers
  • Key stretching
    • PBKDF2
    • Bcrypt

Readings[edit | edit source]

Multimedia[edit | edit source]

  1. YouTube: WEP vs. WPA - CompTIA Security+ SY0-401: 6.2
  2. YouTube: Cryptographic Hash Functions - CompTIA Security+ SY0-401: 6.2
  3. YouTube: Symmetric Encryption Ciphers - CompTIA Security+ SY0-401: 6.2
  4. YouTube: Asymmetric Cryptography Algorithms - CompTIA Security+ SY0-401: 6.2
  5. YouTube: One-Time Pads - CompTIA Security+ SY0-401: 6.2
  6. YouTube: NTLM - CompTIA Security+ SY0-401: 6.2
  7. YouTube: Transport Encryption Algorithms - CompTIA Security+ SY0-401: 6.2
  8. YouTube: Strong vs. Weak Encryption - CompTIA Security+ SY0-401: 6.2

Activities[edit | edit source]

See Also[edit | edit source]

References[edit | edit source]