• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

WGU D334 Cryptography Algorithms Overview (Symmetric-Block)

Latest WGU Jan 14, 2026 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

WGU D334 Cryptography Algorithms Overview (Symmetric-Block) Joe_Luster Modified 22/06/24 Save Share Cryptography Algorithms Symmetric Ciphers Block Cipher Algorithms Stream Cipher Algorithms Symmetric Cipher uses the same key for both encryption and decryption.• Block Cipher encrypts data in fixed-size blocks. Examples include DES, AES, Blowfish.• Stream Cipher encrypts data one bit or byte at a time. Examples include RC4, FISH, PIKE.• DES (Data Encryption Standard) is a symmetric-key algorithm for digital data encryption.• 3DES (Triple Data Encryption Algorithm) applies DES cipher three times to each data block.• AES (Advanced Encryption Standard) is a widely used symmetric encryption algorithm.• Blowfish is a symmetric-key block cipher designed by Bruce Schneier.• Twofish is a successor to Blowfish, a symmetric key block cipher with a block size of 128 bits.• Serpent is a symmetric key block cipher finalist in the AES competition.• RCA is a type of stream cipher.• RC4 is a widely used stream cipher.• FISH and PIKE are stream ciphers, with PIKE being the successor to FISH.• Want to see your own notes transformed? Give it a go

Block Cipher Modes Asymmetric Ciphers Asymmetric Cipher Historical Ciphers Historical Ciphers Extras ECB (Electronic Codebook) is a mode of operation for block ciphers.• CBC (Cipher-Block Chaining) is a mode of operation for block ciphers.• PCBC (Propagating Cipher-Block Chaining) is a mode of operation for block ciphers.• CFB (Cipher Feedback) is a mode of operation for block ciphers.• OFB (Output Feedback) is a mode of operation for block ciphers.• CTR (Counter) is a mode of operation for block ciphers.• Asymmetric Cipher uses a pair of keys – a public key for encryption and a private key for decryption.• RSA (Rivest-Shamir-Adleman) is a widely used asymmetric encryption algorithm.• ECC (Elliptic Curve Cryptography) is an approach to public-key cryptography based on elliptic curves.• El Gamal is an asymmetric key encryption algorithm.• DSA (Digital Signature Algorithm) is used for digital signatures.• Diffie Hellman (DH) is a method of securely exchanging cryptographic keys over a public channel.• Historical Ciphers are early encryption methods that are no longer secure by modern standards.• Atbash is a simple substitution cipher.• Caesar is a substitution cipher where each letter is shifted a fixed number of places.• ROT-13 is a simple substitution cipher that shifts characters 13 places in the alphabet.• Vigenere is a polyalphabetic substitution cipher.• Playfair is a digraph substitution cipher.• Want to see your own notes transformed?

This product is enhanced with AI and may provide incorrect or problematic content. Please report any content that needs review.Key Exchanges Hash Functions

MAC/HMAC

NSA Suite B Key Exchanges are methods for securely exchanging encryption keys.• Diffie Hellman (DH) is a method of securely exchanging cryptographic keys over a public channel.• Menezes-Qu-Vanstone (MQV) is a key agreement protocol.• Key Exchange Algorithm (KEA) is a key exchange algorithm used by the NSA.• Elliptic Curve DH (ECDH) is a key exchange protocol based on elliptic curve cryptography.• Hash Functions convert input data into a fixed-size string of characters.• MD5 (Message Digest Algorithm 5) is a widely used hash function.• MD6 is a cryptographic hash function.• SHA-1, SHA-2, SHA-3 are Secure Hash Algorithms, a family of cryptographic hash functions.• FORK-256 is a cryptographic hash function.• RIPEMD-160 is a 160-bit cryptographic hash function.• MAC/HMAC (Message Authentication Code / Hash-based Message Authentication Code) are used for data integrity and authenticity.• NSA Suite B is a set of cryptographic algorithms endorsed by the National Security Agency.• AES with Galois/Counter Mode is used for symmetric encryption.• Elliptic-Curve DSA (ECDSA) is used for digital signatures.• Elliptic-Curve Diffie-Hellman (ECDH) is used for key agreement.• SHA-2 (SHA256 - SHA384) is used for message digest.• Want to see your own notes transformed?

Study this material Flashcards Practice questions Want to see your own notes transformed?

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

This document featured detailed explanations that was incredibly useful for my research. Such an impressive resource!

Download Document

Buy This Document

$11.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Latest WGU
Added: Jan 14, 2026
Description:

WGU D334 Cryptography Algorithms Overview (Symmetric-Block) Joe_Luster Modified/24 Save Share Cryptography Algorithms Symmetric Ciphers Block Cipher Algorithms Stream Cipher Algorithms Symmetric Ci...

Unlock Now
$ 11.00