What is the proper terminology and base CVSS score for the following cache related behaviour?

An interface (website/application) that requires authentication should have a proper HTTP caching mechanism. When it doesn’t, it allows an attacker to browse back after logout or read the cache in another way.

In order to do so, the serve… Continue reading What is the proper terminology and base CVSS score for the following cache related behaviour?

Terms for differentiating between key-exchange and public-key cryptosystem

The RSA and Diffie-Hellman protocols are part of asymmetric cryptography. But is there a word to distinguish between cryptosystem like RSA (i.e. there are two keys, one for encryption and another for decryption) and Diffie-He… Continue reading Terms for differentiating between key-exchange and public-key cryptosystem

Terms for differentiating between key-exchange and public-key cryptosystem

The RSA and Diffie-Hellman protocols are part of asymmetric cryptography. But is there a word to distinguish between cryptosystem like RSA (i.e. there are two keys, one for encryption and another for decryption) and Diffie-He… Continue reading Terms for differentiating between key-exchange and public-key cryptosystem

What’s the appropriate term for the digest output of various integrity hash and HMAC functions?

I’ve heard conflicting statements from various CISSP instructors, so I’d like some "real world" perspectives:
What is the appropriate terminology for the digest output of the following algorithms:

MD5
SHA-1, SHA-256, SHA-x

Some… Continue reading What’s the appropriate term for the digest output of various integrity hash and HMAC functions?