O'Reilly logo

SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Second Edition, 2nd Edition by Darril Gibson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 14

Cryptography

In this chapter, you will learn about

•  Basic cryptography concepts and terms

•  Hashing algorithms and integrity concepts

•  Common symmetric encryption algorithms

•  Differences between symmetric and asymmetric encryption

•  Asymmetric encryption using public and private keys

•  Asymmetric encryption and digital signatures

•  Hiding data within data using steganography

•  The components of a public key infrastructure

•  Different types of cryptanalysis attacks

Understanding Basic Cryptography Concepts

Chapter 1 introduces confidentiality and integrity (in the context of the CIA security triad of confidentiality, integrity, and availability). Cryptography includes confidentiality and integrity, but it’s worth stressing ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required