O'Reilly logo

CompTIA Security+ SY0-401 In Depth by Mark Ciampa

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

chapter 5Basic Cryptography

After completing this chapter, you should be able to do the following:

• Define cryptography

• Describe hash, symmetric, and asymmetric cryptographic algorithms

• List the various ways in which cryptography is used

Today’s Attacks and Defenses

With today’s super-fast computers and the advancements in cryptography it would seem that an encrypted message dating back 70 years could easily be broken. However, that proved not to be the case in this fascinating incident.

In 1982, David and Anne Martin were renovating a fireplace that had been sealed off for many years in their 17th-century house in the village of Bletchingley, England. In the chimney, the Martins discovered the remains of a carrier pigeon with a small scarlet ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required