Chapter 5. Cryptography

OBJECTIVES

Discuss the uses of cryptography including confidentiality, integrity, authentication, and nonrepudiation.

  • Cryptography is not an easy subject to study. Many complicated mathematical algorithms exist, and few people who are not dedicated to the field find pleasure in examining them. The first step in approaching a study of cryptography is to understand what it is used for and some of the common terms. After you understand how cryptography is used and how critical it is to computer security, you'll be ready to face those complicated algorithms.

Compare and contrast symmetric and asymmetric algorithms.

  • Two major types of cryptographic algorithms—symmetric and asymmetric—exist. Understanding how they work and ...

Get CISSP Training Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.