Symmetric Encryption
Asymmetric Encryption
Cryptography Uses and Limitations
Cryptographic Implementation
Hashing
100

This was heavily used through the 1990s until hackers figured out how to brute-force the keys. 

What is Data Encryption Standard (DES)

100

Its purpose was to allow two users who have never met to safely create a shared key over a public channel such as the internet.

Diffie-Hellman

100
These are the four parts of the information security goal.

Confidentiality, Integrity, Authenticity, Non-repudiation 

100

This combines the strengths of hashing, symmetric encryption, and asymmetric encryption 

Hybrid model

100

This characteristic of a hash cannot be reverse engineered.

One-way

200

This was developed by Jaon Daemen and Vincent Rijmen in 2001 as part of a NIST competition held to find a replacement for DES.

What is Advanced Encryption Standard (AES)

200

This is still one of the most commonly used algorithms and helped defined the process of using a public key to encrypt data and a private key to decrypt the data. 

Rivest-Shamir-Adleman (RSA)

200

This is one of the biggest limitations of encryption.

Speed
200

This is the process of hiding a message inside of a media file, such as an image.

Steganography

200

This characteristic is changing any bit of data will result in a completely different hash. 

Avalanche effect

300

This is slower than AES and replaced an older encryption with similar name.

What is Twofish

300

This is only used for creating digital signatures and became a government standard in 1993.

Digital Signature Algorithm (DSA)

300

This simply makes something harder to understand without changing the data itself.

Obfuscation

300

This is a hardware chip on the motherboard that can generate and store cryptographic keys.

TPM

300

After you download a file you hash the download to prove this.

File integrity

400

This was first developed in 1991 by James Massey and Xuejia Lai. 

International Data Encryption Algorithm (IDEA)

400

It was originally introduced in 1985. It did not enter wide usage until 2004.

Elliptic Curve Cryptography (ECC)

400

This provides non-repudiation.

Digital signature

400

This is is a piece of hardware and associated software/firmware that is connected to a computer system to provide cryptographic functions.

HSM

400

First published in 1991 by the National Institute of Standards and Technology (NIST).

Secure Hash Algorithm (SHA)

500

This replaced IDEA in PGP 3.0 and is also an option in all versions of Open PGP. 

CAST

500

These are the two part of a digital signature.

Sender's private key and Hash

500

To help prevent this keys should only be used once and be at least 256-bits

Key weakness

500

These 4 are also known as hardware security modules.

Personal Computer Security Module (PSCM)

Secure Application Module (SAM)

Hardware Cryptographic devices

Cryptographic modules

500

This command compares two hash values.

-eq

M
e
n
u