Cryptographic Modes of Operation Electronic Code Book (ECB) Cipher Block Chaining (CBC) Cipher Feedback (CFB) Output Feedback (OFB) Counter (CTR) Galois/Counter (GCM) Counter with Cipher Block Chaining Message Authentication Code (CCM) External Resources ”CISSP Official Study Guide Ninth Edition”, Mike Chaple, James Michael Stewart, Darril Gibson; Sybex; 2021; Chapters 6 “Cryptography and Symmetric Key […]
Tag Archives | crypto
Digital Certificates
Digital certificates, also known as public key certificates or identity certificate, . When I explain what a digital certificate to someone without a strong IT background I like to compare it with a seal ring, like the ones used in medieval times of Western countries. These seal rings had two functions: Identify the holder. Because […]
Trusted Platform Module (TPM)
Trusted Platform Module (TPM, also known as ISO/IEC 11889) is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys. It is used to generate a password safely in a system. It avoids generating a password in an external system and having to transport it from one […]