CHAPTER 11

Cryptography 101

This chapter includes questions from the following topics:

•   Describe cryptography and encryption techniques

•   Define cryptographic algorithms

•   Describe public and private keys generation concepts

•   Describe digital signature components and use

•   Describe cryptanalysis and code-breaking tools and methodologies

•   List cryptography attacks

I’ve lived in four different states and two foreign countries, and each stop along the way offered something irreplaceable, unique, and downright cool. And almost without fail, I didn’t appreciate that irreplaceable, unique, and cool thing until I left for a new locale. Maybe it’s just human nature to look backward and romanticize what is no longer yours, but I think ...

Get CEH Certified Ethical Hacker Practice Exams, Fifth Edition, 5th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.