7.9. Exam Essentials

Be able to describe the process of a hashing algorithm

Hashing algorithms are used to mathematically derive a key from a message. The most common hashing standards for cryptographic applications are the SHA and MD algorithms.

Know the principles of a symmetric algorithm

A symmetric algorithm requires that receivers of the message use the same private key. Symmetric algorithms can be extremely secure. This method is widely implemented in governmental applications. The private key is changed using out-of-band transmission.

Be able to describe the process of asymmetric algorithms

Asymmetric algorithms use a two-key method of encryption. The message is encrypted using the public key and decrypted using a second key or private ...

Get CompTIA Security+™ Deluxe: Study Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.