Chapter 10

PKI and Cryptographic Applications

THE CISSP EXAM TOPICS COVERED IN THIS CHAPTER INCLUDE:

  • Cryptography
    • Understand the application and use of cryptography
      • Data at rest (e.g., hard drive); data in transit (e.g., “on the wire”)
    • Understand encryption concepts
      • Foundational concepts; symmetric cryptography; asymmetric cryptography; hybrid cryptography; message digests; hashing
    • Understand key management process
      • Creation/distribution; storage/destruction; recovery; key escrow
    • Understand digital signatures
    • Understand methods of cryptanalytic attacks
      • Chosen plain-text; social engineering for key discovery; brute force; cipher-text only; known plaintext; frequency analysis; chosen cipher-text; implementation attacks
    • Employ cryptography ...

Get CISSP®: Certified Information Systems Security Professional Study Guide, Fifth Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.