Cryptographic Concepts
Match cryptographic algorithms and methods with their appropriate applications and security strengths. This exercise reinforces understanding of when to apply different encryption types, hashing functions, and digital signature methods.
Diffie-Hellman
3DES
MD5
AES
PBKDF2
HMAC
SHA-256
RSA
ECC
DSA
Stronger legacy symmetric encryption than DES
Digital signature creation and verification
Key stretching with salts for secure password storage
Robust hashing function for ensuring data integrity
Asymmetric encryption suitable for secure key exchange
Keyed hashing mechanism for data authenticity
Asymmetric encryption with smaller key sizes and high security
Secure key exchange without transmitting keys
Fast symmetric encryption for bulk data
Legacy hashing function prone to collisions