Chapter 4
Cryptography
This chapter covers the following topics:
Cryptography Overview: This section introduces you to encryption and decryption concepts as well as states of data.
Symmetric Cryptography: This section explores symmetric cryptography.
Asymmetric Cryptography: This section explores asymmetric cryptography.
Using Symmetric and Asymmetric Cryptography: This section discusses when to use symmetric cryptography and when to use asymmetric cryptography.
Types of Ciphers: This section provides descriptions and examples of various symmetric and asymmetric ciphers.
Certificates and PKI: This section explores the need for certificates and PKI for cryptography.
Hashing: This section covers hashing and provides examples of when to use hashing. ...
Get Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.