|
|
Before you take the exam, be certain you are familiar with the following terms
| Advanced Encryption Standard (AES) | latency |
| asymmetric algorithms | local registration authority (LRA) |
| birthday attacks | mathematical attacks |
| Blowfish | message authentication code (MAC) |
| brute force attacks | message digest |
| CAST | Message Digest Algorithm (MDA) |
| certificate authority (CA) | one-time pads |
| certificate policies | out-of-band method |
| certificate practice statement (CPS) | private key |
| certificate revocation | public key |
| certificate revocation list (CRL) | Public Key Infrastructure (PKI) |
| certificates | public-key system |
| cleartext | quantum cryptography |
| cryptanalysts | registration authority (RA) |
| cryptographers | repository |
| cryptographic algorithms | RSA |
| cryptography | Secure Hash Algorithm (SHA) |
| Diffie-Hellman | steganography |
| digital signature | strength |
| Elliptic Curve Cryptosystem (ECC) | strong |
| hash value | Triple-DES (3DES) |
| hashing | weak key attacks |
| International Data Encryption Algorithm (IDEA) | work factor |
|
|