Chapter 12Cryptographic Attacks and Defenses

This Chapter helps you prepare for the EC-Council Certified Ethical Hacker (CEH) Exam by covering the following EC-Council objectives, which address cryptography. This includes items such as

Understand symmetric encryption

Image Symmetric encryption uses a single key.

Understand asymmetric encryption

Image Asymmetric encryption uses dual keys.

Explain digital certificates

Image They provide a means of proving your ...

Get Certified Ethical Hacker Exam Prep now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.