Site MapHelpFeedbackChapter Summary
Chapter Summary
(See related pages)

Identify the Three Different Types of Cryptography

  • Symmetric cryptography is based upon the concept of a shared secret or key.


  • A symmetric cryptography is based upon a key that can be made openly available to the public, yet still provide security.


  • One-way, or hashing, cryptography takes data and enciphers it. However, there is no way to decipher it and no key.


Recognize the Current Cryptographic Algorithms

  • Hashing


  • SHA


  • MD (Message Digest)


  • MD2


  • MD4


  • MD5


  • Symmetric


  • DES (Data Encryption Standard)


  • 3DES


  • AES (Advanced Encryption Standard)


  • CAST


  • RC (Rivest Cipher)


  • RC2


  • RC4


  • RC5


  • RC6


  • Blowfish


  • IDEA


  • Asymmetric


  • RSA


  • Diffie-Hellman


  • ElGamal


  • ECC


Show How Cryptography Is Used for Security

  • Confidentiality is gained because encryption is very good at scrambling information to make it look like random noise, when in fact a key can decipher the message and return it to its original state.


  • Integrity is gained because hashing algorithms are specifically designed to check integrity. They can reduce a message to a mathematical value that can be independently calculated, guaranteeing that any message alteration would change the mathematical value.


  • Nonrepudiation is the property of not being able to claim that you did not send the data. This property is gained because of the properties of private keys.


  • Authentication, or being able to prove you are you, is achieved through the private keys involved in digital signatures.


  • Digital Signatures, combining multiple types of encryption, provide an authentication method verified by a third party, allowing you to use them as if you were actually signing the document with your regular signature.









Security+ and BeyondOnline Learning Center

Home > Chapter 5 > Chapter Summary