7.8. Summary
This chapter focused on the basic elements of cryptography and the PKI implementation. There are three primary methods of encryption:
Symmetric
Asymmetric
Hashing
Symmetric systems require that each end of the connection have the same key. Asymmetric systems use a two-key system. In public key cryptography, the receiver has a private key known only to them; a public key corresponds to it, which they make known to others. The public key can be sent to all other parties; the private key is never divulged. Hashing refers to performing a calculation on a message and converting it into a numeric hash value.
There are five main considerations in implementing a cryptography system:
Confidentiality
Integrity
Authentication
Nonrepudiation
Access ...
Get CompTIA Security+™ Deluxe: Study Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.