About
Content
Stop reading
1. What is the difference between symmetric and asymmetric cryptography?
2. What is a hash function?
3. What is the purpose of a digital signature?
4. What is a block cipher?
5. What is a stream cipher?
6. What is the difference between public-key and private-key cryptography?
7. What is the purpose of a certificate authority?
8. What is the difference between a digital certificate and a public key certificate?
9. What is the purpose of a key escrow system?
10. What is the purpose of a key management system?
11. What is the difference between a key store and a key management service?
12. What is the purpose of a hardware security module?
13. What is the difference between a FIPS 140-2 Level 1 and a FIPS 140-2 Level 2 security module?
14. What is the purpose of a cryptographic hash function?
15. What is the difference between a message authentication code and a digital signature?
16. What is the purpose of a public key infrastructure?
17. What is the difference between a certificate authority and a registration authority?
18. What is the purpose of a key recovery system?
19. What is the difference between a symmetric key and an asymmetric key?