• Plaintext Clear text that is readable.
  • Ciphertext Data that is scrambled and unreadable.
  • Cryptographic key A key is a piece of information that controls how the cryptographic algorithm functions. It can be used to control the transformation of plaintext to ciphertext or ciphertext to plaintext. As an example, the Caesar cipher uses a key that moves forward three characters to encrypt and back by three characters to decrypt.
  • Substitution cipher A simple method of encryption in which units of plaintext are substituted with ciphertext according to a regular system. This could be by advancing one or more letters in the alphabet. The receiver deciphers the text by performing an inverse substitution.

Table FF.14. Encryption Advantages and Disadvantages

Type of Encryption




Faster than asymmetric

Key Distribution


Only provides confidentiality


Easy key exchange

Slower than symmetric


Can provide confidentiality and authentication

  • Digital certificates are used to prove your identity when performing electronic transactions.

Penetration Testing

Certified Ethical Hacker Exam Prep
Certified Ethical Hacker Exam Prep
ISBN: 0789735318
EAN: 2147483647
Year: 2007
Pages: 247
Authors: Michael Gregg
Simiral book on Amazon © 2008-2017.
If you may any questions please contact us: