Security+ Domain 5.0: Risk Management: Chapter 27

Chapter 27: Cryptographic Algorithms

Symmetric

DES, 3DES (block)

AES (block)

Blowfish, Twofish (block)

RC2, RC4 (stream), RC5 (block), RC6 (block)

Asymmetric

RSA

DSA

Elliptic Curve (ECC – requires less power, good for mobile)

PGP / GPG

Digital Signatures

RSA

DSA

Key Exchange

Diffie-Hellman

KEA, IKEA, etc.

Hashing

MD5

SHA-1, SHA-2, SHA-3

HMAC

RIPEMD

Key Stretching

Obfuscation

XOR

ROT13

Substitution ciphers