Implementing the Appropriate Cryptographic Protocols and Algorithms
This chapter covers the following topics:
Hashing: This section covers Secure Hashing Algorithm (SHA), hash-based message authentication code (HMAC), message digest (MD), RACE Integrity Primitives Evaluation Message Digest (RIPEMD), and Poly1305.
Symmetric Algorithms: This section covers modes of operation including Galois/Counter Mode (GCM), electronic codebook (ECB), cipher block chaining (CBC), counter (CTR), and output feedback (OFB). It also covers stream and block algorithms including Advanced Encryption Standard (AES), Triple Digital Encryption Standard (3DES), ChaCha, and Salsa20.
Asymmetric Algorithms: This section covers key agreement algorithms including ...