O'Reilly logo

CCNA Security Study Guide, 2nd Edition by Troy McMillan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3Understanding Cryptography

CISCO CCNA SECURITY EXAM OBJECTIVES COVERED IN THIS CHAPTER:

  • images 1.3 Cryptography concepts
    • Describe key exchange
    • Describe hash algorithm
    • Compare and contrast symmetric and asymmetric encryption
    • Describe digital signatures, certificates, and PKI

images Cryptography is the use of mathematical algorithms to scramble data so it cannot be read if captured. In that role cryptography provides confidentiality, but that is not the only security goal it can achieve. Through the use of hash values and digital signatures, it ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required