O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Apply Your Knowledge

Exercises

9.1. Understanding the Relationship of the Encryption Algorithm and the Key

This exercise provides an understanding of how the encryption algorithm and the encryption key work together in secret key cryptography.

Estimated Time: 15 minutes

1.
Select a number to represent the data that you want to encrypt.
2.
Select an algorithm, or mathematical formula, to be applied to the data.
3.
Select a key, which is a variable that will be inserted into the algorithm to make each application of the algorithm generate a different result.
4.
Perform the calculation.
5.
Ask someone else, given only the result in step 4, to attempt to “decode” the original data.
6.
List the components of the encryption process previously described. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required