Cisco CyberOps
HomeCertifications
  • Links
  • 1.0 Network Fundamentals - 20%
    • Exam Topics
  • 2.0 Network Access - 20%
    • Exam Topics
  • Security Monitoring
    • Attack Surface
    • Common Attacks
    • Data Types and Uses
  • Concealing the Attack
  • Certificates
    • What are certificates?
    • Certificate functions
    • Components
Powered by GitBook
On this page
  • Key Exchange Algorithms
  • Authentication Algorithms
  • Encryption Key
  • MAC Algorithm
  • X.509 Standard
  • PKCS - Public Key Cryptography Standards

Was this helpful?

  1. Certificates

Components

Ciphers and Cipher Suits

Key Exchange Algorithms

  1. RSA

  2. DH

  3. ECDH

Authentication Algorithms

  1. RSA

  2. DSA

  3. ECDSA

Encryption Key

  1. AES

  2. 3DES

  3. DES

MAC Algorithm

  1. SHA

  2. MD5

X.509 Standard

Used in

SSL

TLS

HTTPs

Email

IPSec

SSH

EAP-TLS

Secure Socket Layer - SSL

Transport Layer Security - TLS

PKCS - Public Key Cryptography Standards

15 defined for use

PKCS 7 and PKCS 12 are more used

PreviousCertificate functions

Last updated 3 years ago

Was this helpful?