Chapter 9. Understanding Cryptographic Solutions
THE FOLLOWING CCNA-SECURITY EXAM TOPICS ARE COVERED IN THIS CHAPTER:
Implement site-to-site VPNs on Cisco routers using SDM
Explain the different methods used in cryptography
In the last section of this chapter, we will look at encryption algorithms and how to make a selection based on your criteria.
Introduction to Cryptography
Cryptography is defined many ways, but the main point to get across is that we are talking about the encryption of a message, file, and so on. We will get into other facets of the study of encryption, but let's look at the basics first.
You may have heard the term cryptology, which ...