Comparing Encryption Methods
Chapter 1, “Understanding Core Security Principles,” introduced the security triad of confidentiality, integrity, and availability. Confidentiality ensures that unauthorized individuals aren’t able to access data. One of the methods used to prevent the loss of confidentiality is encryption.
Encryption scrambles data so that unauthorized users are unable to read it. There are many different types of encryption protocols and algorithms in use; you’ve already read about several of them in this book. For example, Chapter 8, “Understanding Wireless Security,” provided a short introduction to encryption. As a reminder, most encryption includes an algorithm and a key. The algorithm provides a mathematical formula that identifies ...