Security+ SY0-601 Notes and Resources

Documentation for Sec+ SY0-601 learning materials and notes.

Back to Home | Back to Domain Two

Subdomain 2.8

Summarize the basics of cryptographic concepts.

Terms: 49


Digital Signatures

Key Length

Key Stretching

Salting

Hashing

Key Exchange

Elliptic-Curve Cryptography (ECC)

Perfect Forward Secrecy (PFS)

Quantum

Provides security based on the fundamental laws of physics, instead of the mathematical algorithms or computing technology used in classical cryptography.

Communications
Computing

Post-Quantum

Ephemeral

Modes of Operation

Procedural rules for a generic block cipher. Different modes of operation result in different properties being achieved, which add to the security of the underlying block cipher. The block cipher processes the data blocks of fixed size in the character.

Authenticated
Unauthenticated
Counter

Blockchain

Public Ledgers

Cipher Suites

Are a combination of encryption, authentication, and message authentication code (MAC) algorithms that are employed with SSL/TLS connections. They are negotiated between the web server and web browser during the initial handshake process.

Stream
Block

Symmetric vs. Asymmetric

Lightweight Cryptography

Steganography

Audio
Video
Image

Homomorphic Encryption

Common Use Cases

Low Power Devices
Low Latency
High Resiliency
Supporting Confidentiality
Supporting Integrity
Supporting Obfuscation
Supporting Authentication
Supporting Non-Repudiation

Limitations Regarding Cryptographic Concepts

Speed
Size
Weak Keys
Time
Longevity
Predictability
Reuse
Entropy
Computational Overheads
Resource vs. Security Constraints

Demonstrate Your Understanding

Back to Top | Study in a New Tab

Click or tap on ‘Choose a Study Mode’ to switch between flash cards, match, learn, test and more.