Menu

3.6 Given a business requirement, implement the appropriate cryptographic protocols and algorithms.

Hashing

 Secure Hashing Algorithm (SHA)

 Hash-based message authentication code (HMAC)

 Message digest (MD)

 RACE integrity primitives evaluation message digest (RIPEMD)

 Poly1305

Symmetric algorithms

 Modes of operation

  Galois/Counter Mode (GCM)
  Electronic codebook (ECB)
  Cipher block chaining (CBC)
  Counter (CTR)
  Output feedback (OFB)

 Stream and block

  Advanced Encryption Standard (AES)
  Triple digital encryption standard (3DES)
  ChaCha
  Salsa20

Asymmetric algorithms

 Key agreement

  Diffie-Hellman
  Elliptic-curve Diffie-Hellman (ECDH)

 Signing

  Digital signature algorithm (DSA)
  Rivest, Shamir, and Adleman (RSA)
  Elliptic-curve digital signature algorithm (ECDSA)

Protocols

 Secure Sockets Layer (SSL)/Transport Layer Security (TLS)

 Secure/Multipurpose Internet Mail Extensions (S/MIME)

 Internet Protocol Security (IPSec)

 Secure Shell (SSH)

 EAP

Elliptic curve cryptography

 P256

 P384

Forward secrecy

Authenticated encryption with associated data

Key stretching

 Password-based key derivation function 2 (PBKDF2)

 Bcrypt