9781111640125_IM_ch11

Security+ Guide to Network Security Fundamentals

  • No School
  • NONE 0
  • Notes
  • 12

This preview shows page 9 - 12 out of 12 pages.

18. Mention that if the computer does not support hardware-based TPM then the encryption keys for securing the data on the hard drive can be stored by BitLocker on a USB flash drive. 19. Define a Hardware Security Module (HSM) as a secure cryptographic processor. 20. Note that an HSM includes an onboard key generator and key storage facility, accelerated symmetric and asymmetric encryption, and can even back up sensitive material in encrypted form. Quick Quiz 2 1. ____ cryptographic algorithms use the same single key to encrypt and decrypt a message. Answer: Symmetric 2. The ____ was approved by the NIST in late 2000 as a replacement for DES. Answer: Advanced Encryption Standard (AES) Advanced Encryption Standard
Image of page 9

Subscribe to view the full document.

Security+ Guide to Network Security Fundamentals, Fourth Edition 11-10 AES 3. Cryptography can also be applied to entire disks. This is known as ____. Answer: whole disk encryption 4. ____ is essentially a chip on the motherboard of the computer that provides cryptographic services. Answer: Trusted Platform Module (TPM) Trusted Platform Module TPM Class Discussion Topics 1. What are the advantages of hashing passwords? 2. What are the main differences between symmetric and asymmetric cryptographic algorithms? Additional Projects 1. Ask your students to read an article about Microsoft’s BitLocker at and write a report summarizing its most important points. 2. Ask your students to read more about the Data Encryption Standard (DES) algorithm and write a report summarizing explaining how it works. Use the following link as a starting point: . Additional Resources 1. Advanced Encryption Standard 2. Symmetric cryptography 3. Asymmetric cryptography 4. PGP Corporation 5. Windows Trusted Platform Module Management Step-by-step Guide (WS.10).aspx
Image of page 10
Security+ Guide to Network Security Fundamentals, Fourth Edition 11-11 Key Terms Advanced Encryption Standard (AES) A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES. algorithm Procedures based on a mathematical formula; used to encrypt data. asymmetric cryptographic algorithm Encryption that uses two mathematically related keys. block cipher A cipher that manipulates an entire block of plaintext at one time. Blowfish A block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits. ciphertext Data that has been encrypted. cleartext Unencrypted data. cryptography The science of transforming information into a secure form while it is being transmitted or stored so that unauthorized persons cannot access it. Data Encryption Standard (DES) A symmetric block cipher that uses a 56-bit key and encrypts data in 64-bit blocks. decryption The process of changing ciphertext into plaintext. digital signature An electronic verification of the sender.
Image of page 11

Subscribe to view the full document.

Image of page 12
You've reached the end of this preview.
  • '
  • NoProfessor
  • Cryptography, Network Security Fundamentals

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern