O'Reilly logo

CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition, 3rd Edition by Matt Walker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 10

Cryptography 101

In this chapter you will

•  Describe cryptography and encryption techniques

•  Define cryptographic algorithms

•  Describe public and private key generation concepts

•  Describe digital signature components and usage

•  Describe cryptanalysis and code-breaking tools and methodologies

•  List cryptography attacks

Around 180 BC, the Greek philosopher and historian Polybius was busy putting together some revolutionary re-thinking of government. He postulated on such ideas as the separation of powers and a government meant to serve the people instead of rule over them. If this sounds familiar, it should: his work became part of the foundation for later philosophers and writers (including Montesquieu), not to mention ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required