O'Reilly logo

Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401) by Mike Meyers

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

MODULE 9

Application of Cryptographic Methods

Cryptography is a wonderful exercise in mathematical problems, but that’s not why it was invented. It was devised for its practical applications, some of which we are going to discuss in this module. We’ll look at data storage protection, transmission security, wireless encryption, and steganography as a sampling of applications that use cryptography in securing systems and data. We are also going to take a look at various considerations in using cryptographic algorithms and methods, including the use of proven versus unproven cryptographic techniques and the use of strong versus weak encryption methods.

Application of Cryptographic Methods

The cryptographic algorithms and methods that we have discussed ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required