using the same key for encryption and decryption
Asymmetric algorithms
Symmetric algorithms
Collision
Hashing
provides integrity so u can be sure the message was not changed and was sent by the said sender. Signed with the private key which nobody else would have.
Salt
Elliptic Curve
Hashing
Digital signature
Change one character of the input and many characters change of the output
Diffusion
Confusion
Collision
Obfuscation
Wireless Cryptographic Protocols: included AES replaced RC4 and included CCMP
WPA
WPA2
CCMP
TKIP
Wireless Cryptographic Protocols: replacement of weakness in WEP (Wired Equivalent Privacy) Needed a short-term bridge between WEP and the successor.
WPA
WPA2
CCMP
TKIP
Wireless Cryptographic Protocols: Uses AES for data confidentiality 128-bit key and a 128-bit block size. Requires additional computing resources.
WPA
WPA2
CCMP
TKIP
use a different key for encryption and decryption. Aka public key cryptography.
Asymmetric algorithms
Symmetric alogrithms
Collision
Hashing
when you have the same has value even though you have different plain text in the password. Use larger hashes to avoid
Diffusion
Confusion
Collision
Obfuscation
The encrypted data is drastically different than the plaintext. The process should be non-linear with no discernible patterns.
Diffusion
Confusion
Collision
Obfuscation
Combines the secret root key with the IV. Adds sequence counter to prevent replay attacks. Implements a 64 vut message integrity check.
WPA
WPA2
CCMP
TKIP
when you take one particular topic or group of code and you make it much more complex to understand
Diffusion
Confusion
Collision
Obfuscation
The expected certificate or PK is pinned to an application. If the expected certificate or public key doesn't match, the application can decide what to do.
Stapling
Key Escrow
Certificate chaining
Pinning