O'Reilly logo

CISSP in 21 Days by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9. Day 8: Cryptography

Yesterday we covered some of the basic concepts in the domain of cryptography. This includes elements such as encryption, decryption, the method of encryption and decryption, types of encryption such as symmetric and asymmetric, and their standard algorithms. We also focused on public key cryptography and the related concepts. We've dealt with the concepts that are related to hashing. Finally, we concluded by looking at various applications where cryptographic algorithms are implemented for security.

Today our goal is to understand more about Public Key Infrastructure (PKI) that uses the concepts of public key cryptography. Since the application of public key cryptography essentially uses asymmetric key, it is necessary ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required