Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 4. Cryptography

Chapter 4. Cryptography

Terms you’ll need to understand:
Symmetric encryption
Asymmetric encryption
Algorithm
Key
Encrypt
Decrypt
One-time pad
Hashing
Message digests
Public key infrastructure (PKI)
Zero knowledge proof
Steganography
IPSec
Link encryption
End-to-end encryption


Techniques you’ll need to master:
Identify cryptographic attacks
Describe the advantages and disadvantages of symmetric and asymmetric systems
Define the structure of public key infrastructure
Detail the components of IPSec
Define the concept of non-repudiation
Know the importance of key security
Be able to define the different modes of DES
Know the Advanced Encryption Standard (AES)
Determine the difference between block and stream ciphers



  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint