CEH
Cryptography in Action 59 So what does the field focus on? Each of the following is a topic you need to understand to put the to ...
60 Chapter 3 ■ Cryptography ■ Secure Hash Algorithm (SHA) ■ Secure Sockets Layer (SSL) ■ Pretty Good Privacy (PGP) ■ Secure Shel ...
Cryptography in Action 61 The terms listed here are critical to understanding all forms of cryptography. You’ll be seeing them a ...
62 Chapter 3 ■ Cryptography MARS This AES finalist was developed by IBM and supports key lengths of 128–256 bits. The goal of th ...
Cryptography in Action 63 The concept of public key cryptography was intended as a way to over- come the key management problems ...
64 Chapter 3 ■ Cryptography A hash function is used in both creating and verifying a digital signature. A hash func- tion is an ...
Cryptography in Action 65 ■ Version ■ Serial number ■ Algorithm ID ■ Issuer ■ Validity ■ Not before ■ Not after ■ Subject ■ Subj ...
66 Chapter 3 ■ Cryptography The CA will require a party to provide information that proves identity. Items such as name, address ...
Cryptography in Action 67 Peer CA The peer CA provides a self-signed certificate that is distributed to its certificate holders ...
68 Chapter 3 ■ Cryptography Understanding Hashing Simply put, hashing is one-way encryption. It is a form of encryption that cre ...
Issues with Cryptography 69 Let’s look at an example of the hashing process. Say you have two parties, Sean and Katrina. Sean is ...
70 Chapter 3 ■ Cryptography TA B LE 3 .1 Cracking times for 40- and 56-bit keys Budget 40-bit key 56-bit key Regular User 1 week ...
Applications of Cryptography 71 coercing a user to accept a self-signed certificate, exploiting vulnerabilities in a web browser ...
72 Chapter 3 ■ Cryptography On the Default Response Rule Authentication Method screen, choose the option Use This String To Pro ...
Applications of Cryptography 73 Click Start ➢ All Programs ➢ Administrative Tools ➢ Local Security Policy. Select the Local Com ...
74 Chapter 3 ■ Cryptography PGP was designed to provide the privacy and security measures that are not currently present in many ...
Exam Essentials 75 Summary In this chapter we covered many components of cryptography and discussed the impor- tance of each. Wi ...
76 Chapter 3 ■ Cryptography Review Questions Symmetric cryptography is also known as. A. Shared key cryptography B. Public key ...
Review Questions 77 A public key is stored on the local computer by its owner in a. A. Hash B. PKI system C. Smart card D. Pri ...
78 Chapter 3 ■ Cryptography Which system does SSL use to function? A. AES B. DES C. 3DES D. PKI In IPSec, encryption and other ...
«
1
2
3
4
5
6
7
8
9
10
»
Free download pdf