O'Reilly logo

CISSP All-in-One Exam Guide, 6th Edition by Shon Harris

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 7Cryptography

This chapter presents the following:

• History of cryptography

• Cryptography components and their relationships

• Steganography

• Algorithm types

• Public key infrastructure (PKI)

• e-mail standards

• Quantum cryptography

• Secure protocols

• Internet security

• Attack types

Cryptography is a method of storing and transmitting data in a form that only those it is intended for can read and process. It is considered a science of protecting information by encoding it into an unreadable format. Cryptography is an effective way of protecting sensitive information as it is stored on media or transmitted through un-trusted network communication paths.

One of the goals of cryptography, and the mechanisms that make it up, is to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required