O'Reilly logo

CompTIA Security+ SY0-301 Authorized Cert Guide, Deluxe Edition, Second Edition by David L. Prowse

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 12. Encryption and Hashing Concepts

This chapter covers the following subjects:

Cryptography Concepts—This section covers the basic terminology of cryptography including encryption, ciphers, and keys. It also discusses private versus public keys, symmetric versus asymmetric encryption, and public key encryption.

Encryption Algorithms—This section delves into the various symmetric algorithms, such as DES and AES, and some of the popular asymmetric algorithms such as RSA and elliptic curve.

Hashing Basics—Here, we investigate the most common way to verify the integrity of files: hashing. We cover basic hashing concepts and cryptographic hash functions, such as MD5, SHA, and NTLM.

This chapter covers the CompTIA Security+ SY0-301 objectives ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required