CHAPTER 24

Cryptographic Methods

In this chapter, you will

     •   Learn how to use appropriate cryptographic methods in any given scenario

     •   Learn the comparative strengths and performance of algorithms

     •   Learn how to use appropriate PKI methods in any given scenario

     •   Learn how to perform certificate management and associated component operations in any given scenario

The use of cryptographic algorithms grows every day. More and more information becomes digitally encoded and placed online, and all of this data needs to be secured. The best way to do that with current technology is to use encryption. This chapter considers some of the tasks cryptographic algorithms accomplish and those for which they are best suited. ...

Get CompTIA Security+ All-in-One Exam Guide, Fourth Edition (Exam SY0-401), 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.