© Ahmed F. Sheikh 2020
A. F. SheikhCompTIA Security+ Certification Study Guidehttps://doi.org/10.1007/978-1-4842-6234-4_15

15. Cryptography

Ahmed F. Sheikh1 
(1)
Miami, FL, USA
 

In this chapter you will learn about several methods of cryptography that were used in ancient Greece. You will also examine encryption algorithms used today and how you can apply encryption to maintain two of the three security principles—confidentiality and integrity.

By the end of this chapter, you will be able to
  1. 1.

    Summarize general cryptography concepts.

     
  2. 2.

    Apply appropriate cryptographic tools and products.

     

Cryptography

Cryptography is the science of taking plain, readable text and applying an algorithm to it, encrypting it to create ciphertext, which appears to be gibberish ...

Get CompTIA Security+ Certification Study Guide: Network Security Essentials now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.