Skip to Content
Certified Ethical Hacker (CEH) v12 312-50 Exam Guide
book

Certified Ethical Hacker (CEH) v12 312-50 Exam Guide

by Dale Meredith
July 2022
Intermediate to advanced
664 pages
15h 56m
English
Packt Publishing
Content preview from Certified Ethical Hacker (CEH) v12 312-50 Exam Guide

Chapter 16: Using Cryptography

If you're new to cryptography, let's talk about its purpose. I'm going to try to make this easy to understand, because to some folks, cryptography can be overwhelming.

Cryptography is all about protecting data, usually in the form of messages or files. This can be done by taking data and transforming it into an unreadable format, often called ciphertext. The only way to transform the ciphertext back into readable data is with a special key, which only the sender and recipient of the message have access to. This process is called encryption, and it's the basis of how cryptography works.

When you're through with this chapter, my hope is that you'll come away with an added perspective and greater depth of understanding ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Certified Ethical Hacker (CEH) Study Guide

Certified Ethical Hacker (CEH) Study Guide

Matt Walker
Certified Ethical Hacker (CEH) v.12

Certified Ethical Hacker (CEH) v.12

ACI Learning, Daniel Lowrie, Sophie Goodwin

Publisher Resources

ISBN: 9781801813099