Chapter 3Understanding Cryptography

CISCO CCNA SECURITY EXAM OBJECTIVES COVERED IN THIS CHAPTER:

  • images 1.3 Cryptography concepts
    • Describe key exchange
    • Describe hash algorithm
    • Compare and contrast symmetric and asymmetric encryption
    • Describe digital signatures, certificates, and PKI

images Cryptography is the use of mathematical algorithms to scramble data so it cannot be read if captured. In that role cryptography provides confidentiality, but that is not the only security goal it can achieve. Through the use of hash values and digital signatures, it ...

Get CCNA Security Study Guide, 2nd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.