Sensitive assets need protection from unauthorized disclosure or tampering. The sensitivity of assets is determined by confidentiality and integrity requirements and the impact of compromise on the corporation or national security. Cryptographic methods and solutions provide assurance to protect assets from compromise.
Observe the following illustration:
The following bullet points represent a brief overview of the preceding diagram. These points explain the overall structure of this chapter in a logical sequence:
Sensitive assets require an additional level of security pertaining to confidentiality and integrity.
Additional security requirements of confidentiality and integrity can be assured through the application of cryptographic methods.
The fundamentals of cryptography are related to encryption and the methods of encryption.
Various types of encryption methods are used in the cryptography domain based on their characteristics, such as the type of algorithm used...