Summary

This chapter focused on the basic elements of cryptography and the PKI implementation. There are three primary methods of encryption:

  • Symmetric
  • Asymmetric
  • Hashing

Symmetric systems require that each end of the connection have the same key. Asymmetric systems use a two-key system. In public key cryptography, the receiver has a private key known only to them; a public key corresponds to it, which they make known to others. The public key can be sent to all other parties; the private key is never divulged. Hashing refers to performing a calculation on a message and converting it into a numeric hash value.

There are five main considerations in implementing a cryptography system:

  • Confidentiality
  • Integrity
  • Authentication
  • Non-repudiation ...

Get CompTIA® Security+™: Study Guide, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.