11

Practical Cryptography

hashing, salting, hash-based message authentication codes (HMACs), and key exchange. Digital signatures, certificates, and public key infrastructure (PKI), focusing on certificate authorities (CAs), certificate signing request (CSR) generation, and Online Certificate Status Protocol (OCSP). Cryptographic tools like Trusted Platform Module (TPM), hardware security module, and key management systems.