image

CHAPTER 2

Cryptography 101

In this chapter you will learn about

• An overview of cryptography and encryption techniques

• Cryptographic algorithms

• How public and private keys are generated

• An overview of MD5, SHA, RC4, RC5, and Blowfish algorithms

• The digital signature and its components

• The method and application of digital signature technology

• An overview of digital certificates

• Cryptanalysis and code-breaking methodologies

• Listing the cryptography attacks

image

You really have to wonder exactly when mankind started keeping secrets ...

Get CEH Certified Ethical Hacker All-in-One Exam Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.