Saturday, November 24, 2012

Cryptography – Chapter 12

This chapter is all about cryptography which is the process of converting plaintext (readable) into ciphertext (unreadable). This process has been around for centuries. The text goes through a brief chronological sequence of the high points as it cryptography evolved. It is important to understand Symmetric and Asymmetric algorithms. Symmetric algorithm uses one mathematical key to encrypt and to decrypt, whereas Asymmetric uses two mathematical keys to encrypt and to decrypt. The book has several pages on understanding cryptography attacks and some possible safeguards to help thwart off attackers.

The chapter goes into much detail about protecting data as travels a network. It provides the security professional with many tools as well as areas to be concerned about. I found the chapter to be very informative along with much insight.   

No comments:

Post a Comment