< All CompTIA Security+ Notes

tsirhCdneM | CompTIA Security+ | Module 6

By: Raul Pop | Related Course: CompTIA Security+ | Published: June 3, 2017 | Modified: June 3, 2017
Join Cybrary

NotepadBlock/Stream Cyphers

Block cyphers

A block Cypher will take information to be processed and process it in block sizes, specific block sizes. You would be told that the block Cypher in either 56 bit blocks or 128 bit blocks.


Stream Cyphers

Stream cyphers on the other hand will take information to be encrypted individually or in bits. So a stream cypher will work in this fashion. Take that, encrypt it one at a time, individually or in bits we say. So stream cyphers work this way, encrypting one character at a time until the entire message is encrypted. For this syllabus, the only stream cypher we have to discuss is RC4.



NotepadCryptography Concepts

Symmetric key Encryption-only 1 key is used

Asymmetric key -public key

                              – private key


Dan       Adam

Dan needs to send adam a message to ensure confidentiality how should dan encrypt the message


A) Use Dan’s Public key => not a solution

B)Use Adam’s Private Key => not a solution

C) Use Dan’s Private key => authenticity not confidentiality

D) Use Adam’s Public Key => this is the solution


Data Encryption Standard(DES)


Hash base Message Authentication Code(HMAC)



One time Pad

Challenge Handshake Authentication Protocol(CHAP)

Password Authentication Protocol

Comparative Strength of algorithms

Key Stretching




The ball is moving well=N56BACTUSAQA(Hash value) you can check for integrity and see changes

The ball is moving great=>different value so is  not collision resistance if the ”text/file” is modified.Can be collision resistance if the message is not compromised


Capture evidence

-Hash the original

-Capture image of original

-Hash of the image




Hide information in another information.(Text in an image)

-Carrier File=>Carried Files


Message digest algorithm(MD5)

Secure Hashing Algorithm(SHA)

Advanced Encryption Standard(AES)

NotepadPublic Key Infrastructure

Core of Public key Infrastructure(PKI)


Symmetric Key

-Public Key

-Private Key

Registration Authority

key Escrow

Recovery Agent

CA-Certificate Authority

CRL-Certificate Revocation list

NotepadTransport Encryption

Internal network=>VPN Connectors=> VPN Internet=> Remote Users

VPN=Virtual Private Network

Creates a tunnel/virtual network


Secure wireless traffic



-initialization vector attack victim



2)WPA-TKIP=Temporal Key Integrity Protocol


< All CompTIA Security+ Notes
Join Cybrary

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?