Preview Mode — This PBQ requires a Premium Membership and is being shown in a read-only preview mode.     See Plans

Cryptographic Concepts

Match cryptographic algorithms and methods with their appropriate applications and security strengths. This exercise reinforces understanding of when to apply different encryption types, hashing functions, and digital signature methods.


PBKDF2
DSA
HMAC
RSA
MD5
SHA-256
AES
3DES
ECC
Diffie-Hellman
Asymmetric encryption with smaller key sizes and high security
Robust hashing function for ensuring data integrity
Secure key exchange without transmitting keys
Keyed hashing mechanism for data authenticity
Legacy hashing function prone to collisions
Digital signature creation and verification
Stronger legacy symmetric encryption than DES
Asymmetric encryption suitable for secure key exchange
Fast symmetric encryption for bulk data
Key stretching with salts for secure password storage