Cryptographic Modes of Operation Electronic Code Book (ECB) Cipher Block Chaining (CBC) Cipher Feedback (CFB) Output Feedback (OFB) Counter (CTR) Galois/Counter (GCM) Counter with Cipher Block Chaining Message Authentication Code (CCM) External Resources ”CISSP Official Study Guide Ninth Edition”, Mike Chaple, James Michael Stewart, Darril Gibson; Sybex; 2021; Chapters 6 “Cryptography and Symmetric Key […]
Digital Certificates
Digital certificates, also known as public key certificates or identity certificate, . When I explain what a digital certificate to someone without a strong IT background I like to compare it with a seal ring, like the ones used in medieval times of Western countries. These seal rings had two functions: Identify the holder. Because […]
Trusted Platform Module (TPM)
Trusted Platform Module (TPM, also known as ISO/IEC 11889) is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys. It is used to generate a password safely in a system. It avoids generating a password in an external system and having to transport it from one […]
Encryption Algorithms
Symmetric Key Cryptographic Systems Data Encryption Standard (DES) Triple DES (3DES) Advanced Encryption Standard (AES) Rivest Ciphers (RC) family RC4 RC5 RC6 Blowfish Twofish International Data Encryption Algorithm (IDEA) Skipjack CAST family CAST-128 CAST-256 Serpent Camellia Kuznyechik Asymmetric Key Cryptographic Systems Rivest Shamir Adleman (RSA) Merkle-Hellman Knapsack Elliptic Curve Cryptography (ECC) Diffie-Hellman ElGamal […]