O'Reilly logo

CompTIA Security+ SY0-401 In Depth by Mark Ciampa

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

chapter 6Advanced Cryptography

After completing this chapter, you should be able to do the following:

• Define digital certificates

• List the various types of digital certificates and how they are used

• Describe the components of Public Key Infrastructure (PKI)

• List the tasks associated with key management

• Describe the different transport encryption protocols

Today’s Attacks and Defenses

Did the U.S. government try to insert a secret weakness into a cryptographic algorithm so they could read encrypted documents?

The Computer Security Law of 1987 was passed by the U.S. Congress to improve the security and privacy of sensitive data on federal computer systems. One part of this law tasked the U.S. National Institute of Standards and Technology ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required