Objectives

Upon completing this lesson, you will be able to:

List the various encryptions, authentications, hash functions, and key management systems used in cryptography

■ Describe the fundamentals of symmetric encryption (secret-key encryption)

■ Describe the fundamentals of asymmetric encryption (public-key encryption) Identify the steps in a key exchange operation using the Diffie-Hellman algorithm

■ Describe the fundamentals of hashing, including the HMAC-MD5 and HMAC-SHA-1 hashing algorithms

0 0

Post a comment