7.9. Exam Essentials
Be able to describe the process of a hashing algorithm
Hashing algorithms are used to mathematically derive a key from a message. The most common hashing standards for cryptographic applications are the SHA and MD algorithms.
Know the principles of a symmetric algorithm
A symmetric algorithm requires that receivers of the message use the same private key. Symmetric algorithms can be extremely secure. This method is widely implemented in governmental applications. The private key is changed using out-of-band transmission.
Be able to describe the process of asymmetric algorithms
Asymmetric algorithms use a two-key method of encryption. The message is encrypted using the public key and decrypted using a second key or private ...
Get CompTIA Security+™ Deluxe: Study Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.