© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2023
S. J. NielsonDiscovering Cybersecurityhttps://doi.org/10.1007/978-1-4842-9560-1_5

5. Core Cryptography Technology

Seth James Nielson1  
Austin, TX, USA
Chapter Quick Start Guide

This chapter provides an overview of modern symmetric encryption and asymmetric encryption.

Key Concepts

  1. 1.

    Symmetric cryptography uses the same key for the inverse of an operation.

  2. 2.

    Asymmetric cryptography uses a public and private key pair.

  3. 3.

    Encryption is often used to provide data confidentiality.

  4. 4.

    Message Authentication Codes (MACs) are usually created by symmetric algorithms for data integrity.

  5. 5.

    Signatures are usually created by asymmetric algorithms for data ...

Get Discovering Cybersecurity: A Technical Introduction for the Absolute Beginner now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.