Chapter 10

Cryptographic Attacks and Defenses

This chapter covers the following topics:

  • Cryptography History and Concepts: You should understand the history and basic concepts of cryptographic systems and how they function.

  • Encryption Algorithms: You should understand the difference between symmetric, asymmetric, and hashing algorithms. Each has a unique role in the world of cryptography and can be used to protect information in transit or at rest.

  • Public Key Infrastructure: You should understand the purpose of public key infrastructure (PKI) and its role in communication and e-commerce. It can provide third-party trust and make e-commerce possible.

  • Secure Protocols and Countermeasures: You should understand secure protocols and how they ...

Get CEH Certified Ethical Hacker Cert Guide, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.