Chapter 12
Introduction to Cryptography
CERTIFICATION OBJECTIVES
12.01 Encryption
12.02 Hashing and digital signatures
12.03 Encryption algorithm attributes
12.04 Security protocol implementation
QUESTIONS
IT security specialists implement cryptographic solutions to protect sensitive data and to ensure the trustworthiness of data including network transmissions.
Hashing is used to verify the integrity of data such as ensuring that files or network messages have not been altered by unauthorized parties. Encryption provides data confidentiality and can use either a single key for encryption and decryption or a related public and private key pair.
IPSec can be used to secure network traffic through authentication and encryption ...
Get CompTIA Security+ Certification Practice Exams, Fourth Edition (Exam SY0-601), 4th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.