This section contains the answers to the exercises and the Chapter review section in this chapter.
Following is the list of cryptographic ciphers implemented by the TrueCrypt v7.1 application:
Combination of these
Following is the list of hashing algorithms implemented by the TrueCrypt v7.1 application:
NOTE: A different version of the TrueCrypt application might implement different algorithms.
Following are examples of three certificates that might be found in the Trusted Root Certification Authorities store on a computer system.
Entrust.net Certification Authority (2048):
Signature cryptographic algorithm: RSA
Signature hashing algorithm: SHA1
Public key algorithm: RSA
Public key ...