Summary
This chapter focused on the basic elements of cryptography and the PKI implementation. There are three primary methods of encryption:
- Symmetric
- Asymmetric
- Hashing
Symmetric systems require that each end of the connection have the same key. Asymmetric systems use a two-key system. In public key cryptography, the receiver has a private key known only to them; a public key corresponds to it, which they make known to others. The public key can be sent to all other parties; the private key is never divulged. Hashing refers to performing a calculation on a message and converting it into a numeric hash value.
There are five main considerations in implementing a cryptography system:
- Confidentiality
- Integrity
- Authentication
- Non-repudiation ...
Get CompTIA® Security+™: Study Guide, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.