Identify levels of encryption.

Identification should include

  • asymmetric encryption
  • symmetric encryption
  • one-way hash
  • salting.