Quick Note On Cryptography From CISSP Exam Perspective
Quick Note On Cryptography From CISSP Exam Perspective
Asymmetric uses different keys for encryption and decryption whereas Symmetric uses the
same key for Encryption and Decryption.
Symmetric Cryptography Key also known as private, session, secret and shared.
Computers can only generate pseudo random numbers and not pure random numbers.
Security depends on the secrecy of the key, not the secrecy of the algorithm.
Kirchokhoff's Law: Make the Algorithm Public and Key secret. where as in Security through
Obscurity believes in keeping keys as well as Algorithm secret.
DES Modes:
1|Page
Quick Note On Cryptography From CISSP Exam Perspective
Link Encryption:
Entire packet is encrypted
Hence the packets gets decrypted at every node.
If one of the node is compromised; then it may lead to breach in confidentiality.
Works at lower layers. Data link layer.
Helps when connecting two offices.