MODULE 9

Application of Cryptographic Methods

Cryptography is a wonderful exercise in mathematical problems, but that’s not why it was invented. It was devised for its practical applications, some of which we are going to discuss in this module. We’ll look at data storage protection, transmission security, wireless encryption, and steganography as a sampling of applications that use cryptography in securing systems and data. We are also going to take a look at various considerations in using cryptographic algorithms and methods, including the use of proven versus unproven cryptographic techniques and the use of strong versus weak encryption methods.

Application of Cryptographic Methods

The cryptographic algorithms and methods that we have discussed ...

Get Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.