Section 2: Understanding Cryptographic Techniques

In this section, we'll first discuss symmetric encryption along with algorithms such as the Data Encryption Standard (DES) and Advanced Encryption Standard (AES). We'll then see how asymmetric encryption uses two keys, and includes algorithms such as Rivest, Shamir, Adleman (RSA) and Elliptic Curve Cryptography (ECC). We'll also learn how asymmetric (or public key) encryption can be used in several ways, to secure email, exchange keys, and create a digital signature. Finally, we'll learn how a hash algorithm is a one-way function that outputs a message digest to provide message authentication.

This section comprises the following chapters:

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
54.87.90.21