CHAPTER 11

Cryptography 101

In this chapter you will

•  Describe cryptography and encryption techniques

•  Define cryptographic algorithms

•  Describe public and private key generation concepts

•  Describe digital signature components and usage

•  Describe cryptanalysis and code-breaking tools and methodologies

•  List cryptography attacks

Around 180 BC, the Greek philosopher and historian Polybius was busy putting together some revolutionary rethinking of government. He postulated on such ideas as the separation of powers and a government meant to serve the people instead of rule over them. If this sounds familiar, it should: his work became part of the foundation for later philosophers and writers (including Montesquieu), and the U.S. Constitution. ...

Get CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition, 5th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.