In the following exercises, you apply what you’ve learned in this chapter. The answers for these exercises are located in the Answers section at the end of this chapter.
Download a cryptography utility from a trusted source. An example might be TrueCrypt from http://www.truecrypt.org. Install the application and establish an encrypted volume. Notice the cryptographic functions required to build and mount the encrypted volume, including the encryption algorithm, password creation, and key creation.
Identify the cryptographic ciphers and the hashing algorithms implemented by the application and the type of cipher.
Locate the Trusted Root Certification Authorities list on your computer. In Internet Explorer, this can ...