O'Reilly logo

CEH Certified Ethical Hacker All-in-One Exam Guide by Matt Walker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

image

CHAPTER 2

Cryptography 101

In this chapter you will learn about

• An overview of cryptography and encryption techniques

• Cryptographic algorithms

• How public and private keys are generated

• An overview of MD5, SHA, RC4, RC5, and Blowfish algorithms

• The digital signature and its components

• The method and application of digital signature technology

• An overview of digital certificates

• Cryptanalysis and code-breaking methodologies

• Listing the cryptography attacks

image

You really have to wonder exactly when mankind started keeping secrets ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required