CISCO CCNA SECURITY EXAM OBJECTIVES COVERED IN THIS CHAPTER:
- 1.3 Cryptography concepts
- Describe key exchange
- Describe hash algorithm
- Compare and contrast symmetric and asymmetric encryption
- Describe digital signatures, certificates, and PKI
Cryptography is the use of mathematical algorithms to scramble data so it cannot be read if captured. In that role cryptography provides confidentiality, but that is not the only security goal it can achieve. Through the use of hash values and digital signatures, it ...