image
9
Cryptography 101
In this chapter you will
•  Get an overview of cryptography and encryption techniques
•  Learn about cryptographic algorithms
•  Learn about how public and private keys are generated
•  Get an overview of MD5, SHA, RC4, RC5, and Blowfish algorithms
•  Learn about the digital signature and its components
•  Learn about the method and application of digital signature technology
•  Get an overview of digital certificates
•  Learn about cryptanalysis and code-breaking methodologies
•  Understand the types of cryptography attacks
Around 180 BC, the Greek philosopher and historian Polybius was busy putting together some revolutionary ...

Get CEH Certified Ethical Hacker All-in-One Exam Guide, Second Edition, 2nd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.