Exam Objectives 1.4
Explain the importance of using appropriate cryptographic solutions.
- Public key infrastructure (PKI):
- Public key: Used for encryption and validation of digital signatures
- Private key: Used for decryption and digital signatures
- Key escrow: Stores cryptographic keys
- Encryption: Changing plaintext into ciphertext:
- Level: The scope or layer at which encryption is applied
- Full disk: Encrypts a full disk
- Partition: Encrypts a single partition
- File: Encrypts individual files
- Volume: Encrypts a single volume
- Database: Encrypts a database
- Record: Encrypts a single database record
- Transport/communication: Encrypted using SSL/TLS
- Asymmetric: Uses two keys, a private key and a public key
- Symmetric: Uses one key and encrypts a large amount of data using block cipher
- Key exchange: Delivers cryptographic keys from a sender to a receiver
- Algorithms: Employs intricate mathematical operations to ensure the irreversibility of encryption
- Key length: The length of cryptographic keys impacts...