MODULE 9

Application of Cryptographic Methods

Cryptography is a wonderful exercise in mathematical problems, but that’s not why it was invented. It was devised for its practical applications, some of which we are going to discuss in this module. We’ll look at data storage protection, transmission security, wireless encryption, and steganography as a sampling of applications that use cryptography in securing systems and data. We are also going to take a look at various considerations in using cryptographic algorithms and methods, including the use of proven versus unproven cryptographic techniques and the use of strong versus weak encryption methods.

Application of Cryptographic Methods

The cryptographic algorithms and methods that we have discussed ...

Get Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401) now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.