The Essentials and Beyond

In this chapter, you learned about different methods of encrypting data. Symmetric encryption uses a single key to encrypt and decrypt data. Asymmetric encryption uses two keys (a public key and a private key) to encrypt and decrypt data. Asymmetric encryption is about 1,000 times slower than symmetric encryption, and it’s typically used only to encrypt and decrypt symmetric keys. AES is a strong, efficient symmetric encryption used in many situations including in Kerberos and BitLocker. Hashing provides one-way encryption and is used for integrity. MD5 and SHA-1 are two common hashing algorithms. You can secure email by encrypting it and digitally signing it. Both require the use of certificates to publically share ...

Get Microsoft® Windows® Security: Essentials now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.