Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

651 total results found

Unit XI

CompTIA A+

Unit XII

CompTIA A+

Unit XIII

CompTIA A+

Unit XIV

CompTIA A+

Unit 3

CompTIA Security+

Overview of Cryptography

CompTIA Security+ Unit 3

The process of writing or solving messages using a secret code. This would be the proper definition of cryptography. However, in computer systems, there is never true secrecy. The existence of information can always be detected on a computer system, one way o...

Asymmetric Encryption

CompTIA Security+ Unit 3

Where encryption and decryption are handled by two different keys. A user will generate a keypair when they want to use asymmetric encryption. One will be public, and the other will be private. The public key will be used to encrypt message being sent to the ...

Rivest-Shamir-Adleman

Documentation

A commonly used asymmetric encryption algorithm used for creating digital signatures.

Elliptic Curve Cryptography

Documentation

A more modern asymmetric encryption algorithm. ECC is able to generate smaller keys and is more secure than other methods. It's being used today to secure websites, their connections, and their data transmissions.

Diffie-Hellman

Documentation

An asymmetric encryption algorithm created to let two users that are stranger to each other to safely create a shared key over a public channel (like the Internet). The Diffie-Hellman exchange process is as follows: The two users agree on a prime number $P...

Digital Signature Algorithm

Documentation

A more modern asymmetric encryption algorithm.

Stream Ciphers

CompTIA Security+ Unit 3

A symmetric encryption method that encrypts data one bit at a time. The stream cipher is based on the one-time pad (OTP) concept that was popular back in WWII days. OTP Characteristics The OTP is a symmetric cipher that uses a secret key to encrypt and decr...

Block Ciphers

CompTIA Security+ Unit 3

A symmetric encryption algorithm that encrypts data in set chunks, with varying chunk sizes. Common sizes range from 64, 128, and 256 bits of length. Notice something? Something about all of them being powers of 2? You know, $2^6$, $2^7$, and $2^8$? When the ...

Blockchain

CompTIA Security+ Unit 3

A unique and increasingly popular implementation of cryptography that was developed in 2008. Blockchain itself is described as the method that a continuously expanding list of transactions are secured using cryptography. In blockchain, each additional record ...

Cryptographic Attacks

CompTIA Security+ Unit 3

There is no such thing as a sure thing when it comes to protecting data stored on computer systems. Encrypting data is only ever relatively secure, but hackers always have a chance of gaining access to encrypted data using a variety of methods. Dictionary At...

GNU Privacy Guard

CompTIA Security+ Unit 3

An encryption tool that encrypts emails, digitally signs them, and also encrypts documents. GPG was an implementation of the Pretty Good Privacy (PGP) protocol. However, PGP is now owned by some random company that will go unnamed. They both follow the OpenPG...

NeepMeat 4fecta

The beginning of a documentation on the new, popular, hit Minecraft modpack NeepMeat 4fecta.

Guides

A collection of beginner guides to processes and concepts in the new hit Minecraft modpack NeepMeat 4fecta.