• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

WGU D334 Cryptography Algorithms Overview (Symmetric-Block)

Latest WGU Jan 13, 2026 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

WGU D334 Cryptography Algorithms Overview (Symmetric-Block) Joe_Luster Modified 22/06/24 Save Share Cryptography Algorithms Symmetric Ciphers Block Cipher Algorithms Stream Cipher Algorithms Symmetric Cipher uses the same key for both encryption and decryption.• Block Cipher encrypts data in fixed-size blocks. Examples include DES, AES, Blowfish.• Stream Cipher encrypts data one bit or byte at a time. Examples include RC4, FISH, PIKE.• DES (Data Encryption Standard) is a symmetric-key algorithm for digital data encryption.• 3DES (Triple Data Encryption Algorithm) applies DES cipher three times to each data block.• AES (Advanced Encryption Standard) is a widely used symmetric encryption algorithm.• Blowfish is a symmetric-key block cipher designed by Bruce Schneier.• Twofish is a successor to Blowfish, a symmetric key block cipher with a block size of 128 bits.• Serpent is a symmetric key block cipher finalist in the AES competition.• RCA is a type of stream cipher.• RC4 is a widely used stream cipher.• FISH and PIKE are stream ciphers, with PIKE being the successor to FISH.• Give it a go

Block Cipher Modes Asymmetric Ciphers Asymmetric Cipher Historical Ciphers Historical Ciphers Extras ECB (Electronic Codebook) is a mode of operation for block ciphers.• CBC (Cipher-Block Chaining) is a mode of operation for block ciphers.• PCBC (Propagating Cipher-Block Chaining) is a mode of operation for block ciphers.• CFB (Cipher Feedback) is a mode of operation for block ciphers.• OFB (Output Feedback) is a mode of operation for block ciphers.• CTR (Counter) is a mode of operation for block ciphers.• Asymmetric Cipher uses a pair of keys – a public key for encryption and a private key for decryption.• RSA (Rivest-Shamir-Adleman) is a widely used asymmetric encryption algorithm.• ECC (Elliptic Curve Cryptography) is an approach to public-key cryptography based on elliptic curves.• El Gamal is an asymmetric key encryption algorithm.• DSA (Digital Signature Algorithm) is used for digital signatures.• Diffie Hellman (DH) is a method of securely exchanging cryptographic keys over a public channel.• Historical Ciphers are early encryption methods that are no longer secure by modern standards.• Atbash is a simple substitution cipher.• Caesar is a substitution cipher where each letter is shifted a fixed number of places.• ROT-13 is a simple substitution cipher that shifts characters 13 places in the alphabet.• Vigenere is a polyalphabetic substitution cipher.• Playfair is a digraph substitution cipher.•

This product is enhanced with AI and may provide incorrect or problematic content. Please report any content that needs review.Key Exchanges Hash Functions

MAC/HMAC

NSA Suite B Key Exchanges are methods for securely exchanging encryption keys.• Diffie Hellman (DH) is a method of securely exchanging cryptographic keys over a public channel.• Menezes-Qu-Vanstone (MQV) is a key agreement protocol.• Key Exchange Algorithm (KEA) is a key exchange algorithm used by the NSA.• Elliptic Curve DH (ECDH) is a key exchange protocol based on elliptic curve cryptography.• Hash Functions convert input data into a fixed-size string of characters.• MD5 (Message Digest Algorithm 5) is a widely used hash function.• MD6 is a cryptographic hash function.• SHA-1, SHA-2, SHA-3 are Secure Hash Algorithms, a family of cryptographic hash functions.• FORK-256 is a cryptographic hash function.• RIPEMD-160 is a 160-bit cryptographic hash function.• MAC/HMAC (Message Authentication Code / Hash-based Message Authentication Code) are used for data integrity and authenticity.• NSA Suite B is a set of cryptographic algorithms endorsed by the National Security Agency.• AES with Galois/Counter Mode is used for symmetric encryption.• Elliptic-Curve DSA (ECDSA) is used for digital signatures.• Elliptic-Curve Diffie-Hellman (ECDH) is used for key agreement.• SHA-2 (SHA256 - SHA384) is used for message digest.•

Study this material Flashcards Practice questions

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

With its step-by-step guides, this document was incredibly useful for my research. Definitely a superb choice!

Download Document

Buy This Document

$11.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Latest WGU
Added: Jan 13, 2026
Description:

WGU D334 Cryptography Algorithms Overview (Symmetric-Block) Joe_Luster Modified/24 Save Share Cryptography Algorithms Symmetric Ciphers Block Cipher Algorithms Stream Cipher Algorithms Symmetric Ci...

Unlock Now
$ 11.00