CHAPTER 9Cryptography and the Public Key Infrastructure

Objectives

Upon completion of this chapter, you will be able to answer the following questions:

  • How is cryptography used to secure communications?

  • What is the role of cryptography in ensuring the integrity and authenticity of data?

  • How do cryptographic approaches enhance data confidentiality?

  • What is public key cryptography?

  • How does the Public Key Infrastructure function?

  • How does the use of cryptography affect cybersecurity operations?

Key Terms

This chapter uses the following key terms. You can find the definitions in the Glossary.

cryptology page 402

cryptography page 403

cryptanalysis page 403

cipher page 404

hashes page 409

Message Digest 5 (MD5) page 412

Secure Hash Algorithm ...

Get CCNA Cybersecurity Operations Companion Guide, First Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.