Description
As you study this section, answer the following questions:
- How do public keys differ from private keys? What is the relationship between the two?
- For which type of environment is asymmetric cryptography best suited?
- Why does asymmetric encryption require fewer keys than symmetric encryption?
- What services are provided by the cryptographic service provider (CSP)?
- What is the main use for the Diffie-Hellman protocol?
This section covers the following TestOut Security Pro certification exam objectives:
- 8.1 Protect and Maintain the Integrity of Data Files
- Implement encryption technologies
- 8.2 Protect Data Transmissions Across Open, Public Networks
- Encrypt data communications
- Implement secure protocols
- Remove unsecure protocols
This section covers the following Security+ certification exam objectives:
6.1 Compare and contrast basic concepts of cryptography.
- Modes of operation
- Asymmetric algorithms
- Elliptic curve
- Weak/deprecated algorithms
- Key exchange
- Digital signatures
- Key strength
- Session keys
- Ephemeral key
- Secret algorithm
- Data-in-transit
- Data-at-rest
- Data-in-use
- Perfect forward secrecy
- Common use cases
- Supporting confidentiality
- Supporting integrity
- Supporting authentication
- Supporting non-repudiation
- Resource vs. security constraints
6.2 Explain cryptography algorithms and their basic characteristics.
- Asymmetric algorithms
- RSA
- DSA
- Diffie-Hellman
- Groups
- DHE
- ECDHE
- Elliptic curve
- PGP/GPG