using the same key for encryption and decryption

provides integrity so u can be sure the message was not changed and was sent by the said sender. Signed with the private key which nobody else would have.

Change one character of the input and many characters change of the output

Wireless Cryptographic Protocols: included AES replaced RC4 and included CCMP

Wireless Cryptographic Protocols: replacement of weakness in WEP (Wired Equivalent Privacy) Needed a short-term bridge between WEP and the successor.

Wireless Cryptographic Protocols: Uses AES for data confidentiality 128-bit key and a 128-bit block size. Requires additional computing resources.

use a different key for encryption and decryption. Aka public key cryptography.

when you have the same has value even though you have different plain text in the password. Use larger hashes to avoid

The encrypted data is drastically different than the plaintext. The process should be non-linear with no discernible patterns.

Combines the secret root key with the IV. Adds sequence counter to prevent replay attacks. Implements a 64 vut message integrity check.

when you take one particular topic or group of code and you make it much more complex to understand

The expected certificate or PK is pinned to an application. If the expected certificate or public key doesn't match, the application can decide what to do.