Chapter 8. Basics of Cryptography

Terms you'll need to understand:

  • Cryptography

  • Algorithm

  • Asymmetric key

  • Symmetric key

  • Block cipher

  • Stream cipher

  • Confidentiality

  • Integrity

  • Authentication

  • Digital signature

  • Nonrepudiation

  • Private key

  • Public key

  • Hashing

  • Public Key Infrastructure (PKI)

  • Certificate Authority (CA)

  • Certificate Revocation List (CRL)

  • Digital certificates

  • Certificate policies

  • Certificate Practice Statement (CPS)

Techniques you'll need to master:

  • Identifying and understanding cryptography algorithms and how they can be used to help improve security

  • Understanding the concepts of using cryptography in a secure environment

  • Understanding the role and components of Public Key Infrastructure as well as the roles and policies in creating a PKI

A cryptosystem or cipher system provides a method for protecting information by encrypting ( disguising ) it into a format that can be read only by authorized systems or individuals. The use and creation of such systems is called cryptography often considered both an art and a science.

Cryptography dates back to the ancient Assyrians and Egyptians. In the beginning, the systems of cryptography were manually performed, but during the twentieth century, mechanical cryptography was born. The cryptography that is the focus of this chapter as well as the exam is modern cryptography, which began with the advent of the computer.

Recently, modern cryptography has become increasingly important and ubiquitous. There have been growing concerns over the security of sensitive data with the growing capabilities of hackers and the proliferation of business networks connected to the Internet. One very practical method of securing this data is through the use of cryptography in the form of encryption algorithms applied to data that is passed around networks or even stored on hard drives .

This chapter discusses the concepts of cryptography as well as many popular encryption methods . You will begin to understand how cryptography can be used as a tool to protect and authenticate all types of information, as well as protect the computers and networks in information security systems.



Security+ Exam Cram 2 (Exam SYO-101)
Security+ Certification Exam Cram 2 (Exam Cram SYO-101)
ISBN: 0789729105
EAN: 2147483647
Year: 2005
Pages: 162

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net