Chapter 15. Cryptographic Techniques
This chapter covers the following topics:
Techniques: This section covers key stretching, hashing, digital signatures, message authentication, code signing, pseudo-random number generation, perfect forward secrecy, data-in-transit encryption, data-in-memory/processing, data-at-rest encryption, and steganography.
Implementations: This section describes crypto modules, crypto processors, cryptographic service providers, DRM, watermarking, GPG, SSL/TLS, SSH, S/MIME, cryptographic applications and proper/improper implementations, stream versus block, PKI, cryptocurrency/blockchain, mobile device encryption considerations, and elliptic curve cryptography.
This chapter covers CAS-003 objective 4.4.