Chapter 12

Introduction to Cryptography


12.01     Encryption

12.02     Hashing and digital signatures

12.03     Encryption algorithm attributes

12.04     Security protocol implementation


IT security specialists implement cryptographic solutions to protect sensitive data and to ensure the trustworthiness of data including network transmissions.

Hashing is used to verify the integrity of data such as ensuring that files or network messages have not been altered by unauthorized parties. Encryption provides data confidentiality and can use either a single key for encryption and decryption or a related public and private key pair.

IPSec can be used to secure network traffic through authentication and encryption ...

Get CompTIA Security+ Certification Practice Exams, Fourth Edition (Exam SY0-601), 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.