Cryptographic Concepts
CompTIA Security+ SY0-701 (V7) PBQ
Match cryptographic algorithms and methods with their appropriate applications and security strengths. This exercise reinforces understanding of when to apply different encryption types, hashing functions, and digital signature methods.
HMAC
AES
Diffie-Hellman
PBKDF2
ECC
MD5
RSA
DSA
SHA-256
3DES
Digital signature creation and verification
Secure key exchange without transmitting keys
Asymmetric encryption with smaller key sizes and high security
Legacy hashing function prone to collisions
Fast symmetric encryption for bulk data
Stronger legacy symmetric encryption than DES
Asymmetric encryption suitable for secure key exchange
Robust hashing function for ensuring data integrity
Key stretching with salts for secure password storage
Keyed hashing mechanism for data authenticity