O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Types of Encryption

  • Identify key issues of cryptography and be able to explain basic cryptographic methods in use today.

    • Identify encryption types.

As you learned in the preceding section, encryption can be used in a number of different ways.

There are a huge number of encryption algorithms—that is, the step-by-step procedures used to scramble data. These include RSA, RC4, DES, and others with more colorful names, such as Blowfish, Twofish, Safer, and FEAL.

NOTE

Elliptic Curve Algorithms Elliptic curve algorithms can speed up public key operations by using a complex factoring method that defines rules for adding two points on a curve to obtain a third point that is also on the curve. Shorter keys can be used (which are faster and require less ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required