This was heavily used through the 1990s until hackers figured out how to brute-force the keys.
What is Data Encryption Standard (DES)
Its purpose was to allow two users who have never met to safely create a shared key over a public channel such as the internet.
Diffie-Hellman
Confidentiality, Integrity, Authenticity, Non-repudiation
This combines the strengths of hashing, symmetric encryption, and asymmetric encryption
Hybrid model
This characteristic of a hash cannot be reverse engineered.
One-way
This was developed by Jaon Daemen and Vincent Rijmen in 2001 as part of a NIST competition held to find a replacement for DES.
What is Advanced Encryption Standard (AES)
This is still one of the most commonly used algorithms and helped defined the process of using a public key to encrypt data and a private key to decrypt the data.
Rivest-Shamir-Adleman (RSA)
This is one of the biggest limitations of encryption.
This is the process of hiding a message inside of a media file, such as an image.
Steganography
This characteristic is changing any bit of data will result in a completely different hash.
Avalanche effect
This is slower than AES and replaced an older encryption with similar name.
What is Twofish
This is only used for creating digital signatures and became a government standard in 1993.
Digital Signature Algorithm (DSA)
This simply makes something harder to understand without changing the data itself.
Obfuscation
This is a hardware chip on the motherboard that can generate and store cryptographic keys.
TPM
After you download a file you hash the download to prove this.
File integrity
This was first developed in 1991 by James Massey and Xuejia Lai.
International Data Encryption Algorithm (IDEA)
It was originally introduced in 1985. It did not enter wide usage until 2004.
Elliptic Curve Cryptography (ECC)
This provides non-repudiation.
Digital signature
This is is a piece of hardware and associated software/firmware that is connected to a computer system to provide cryptographic functions.
HSM
First published in 1991 by the National Institute of Standards and Technology (NIST).
Secure Hash Algorithm (SHA)
This replaced IDEA in PGP 3.0 and is also an option in all versions of Open PGP.
CAST
These are the two part of a digital signature.
Sender's private key and Hash
To help prevent this keys should only be used once and be at least 256-bits
Key weakness
These 4 are also known as hardware security modules.
Personal Computer Security Module (PSCM)
Secure Application Module (SAM)
Hardware Cryptographic devices
Cryptographic modules
This command compares two hash values.
-eq