O'Reilly logo

LPIC-1/CompTIA Linux+ Certification All-in-One Exam Guide (Exams LPIC-1/LX0-101 & LX0-102) by Robb Tracy

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter Review

In this chapter, you learned how to use encryption to secure data on a Linux system. We first looked at encrypting network communications with OpenSSH, and then we looked at using GPG to encrypt Linux files.

I began this chapter by reviewing how encryption works. The first type of encryption we looked at was symmetric encryption. With symmetric encryption, the key used to encrypt a message is the same key used to decrypt the message. That means the sender and the receiver must both have the exact same key. One of the key advantages of using symmetric encryption is speed. It processes much faster than asymmetric encryption. One of the difficulties associated with symmetric encryption is how to securely distribute the key to all ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required