7.9. Exam Essentials
Be able to describe the process of a hashing algorithm
Hashing algorithms are used to mathematically derive a key from a message. The most common hashing standards for cryptographic applications are the SHA and MD algorithms.
Know the principles of a symmetric algorithm
A symmetric algorithm requires that receivers of the message use the same private key. Symmetric algorithms can be extremely secure. This method is widely implemented in governmental applications. The private key is changed using out-of-band transmission.
Be able to describe the process of asymmetric algorithms
Asymmetric algorithms use a two-key method of encryption. The message is encrypted using the public key and decrypted using a second key or private ...