Sistema de blogs Diarium
Universidad de Salamanca
Pablo Gallardo's Blog
My professional web log about IT, Cybersecurity & Project Management
 
Tag Archives | cryptographic

Cryptographic Modes of Operation

Cryptographic Modes of Operation Electronic Code Book (ECB) Cipher Block Chaining (CBC) Cipher Feedback (CFB) Output Feedback (OFB) Counter (CTR) Galois/Counter (GCM) Counter with Cipher Block Chaining Message Authentication Code (CCM)   External Resources  ”CISSP Official Study Guide Ninth Edition”, Mike Chaple, James Michael Stewart, Darril Gibson; Sybex; 2021; Chapters 6 “Cryptography and Symmetric Key […]

Comments { 0 }

Digital Certificates

Digital certificates, also known as public key certificates or identity certificate, . When I explain what a digital certificate to someone without a strong IT background I like to compare it with a seal ring, like the ones used in medieval times of Western countries. These seal rings had two functions: Identify the holder. Because […]

Comments { 0 }

Trusted Platform Module (TPM)

Trusted Platform Module (TPM, also known as ISO/IEC 11889) is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys. It is used to generate a password safely in a system. It avoids generating a password in an external system and having to transport it from one […]

Comments { 0 }

Encryption Algorithms

    Symmetric Key Cryptographic Systems Data Encryption Standard (DES) Triple DES (3DES) Advanced Encryption Standard (AES) Rivest Ciphers (RC) family RC4 RC5 RC6 Blowfish Twofish International Data Encryption Algorithm (IDEA) Skipjack CAST family CAST-128 CAST-256 Serpent Camellia Kuznyechik Asymmetric Key Cryptographic Systems Rivest Shamir Adleman (RSA) Merkle-Hellman Knapsack Elliptic Curve Cryptography (ECC) Diffie-Hellman ElGamal […]

Comments { 0 }
Política de privacidad
Studii Salmantini. Campus de excelencia internacional