2 cissp ® Official Study Guide Eighth Edition


Understand the role that confidentiality, integrity, and nonrepudiation play in cryptosystems



Download 19,3 Mb.
Pdf ko'rish
bet227/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   223   224   225   226   227   228   229   230   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Understand the role that confidentiality, integrity, and nonrepudiation play in cryptosystems. 
Confidentiality is one of the major goals of cryptography. It protects the secrecy of data 
while it is both at rest and in transit. Integrity provides the recipient of a message with the 
assurance that data was not altered (intentionally or unintentionally) between the time it was 
created and the time it was accessed. Nonrepudiation provides undeniable proof that the 
sender of a message actually authored it. It prevents the sender from subsequently denying 
that they sent the original message.
Know how cryptosystems can be used to achieve authentication goals. 
Authentication 
provides assurances as to the identity of a user. One possible scheme that uses authentication 
is the challenge-response protocol, in which the remote user is asked to encrypt a message 


230
Chapter 6 

Cryptography and Symmetric Key Algorithms
using a key known only to the communicating parties. Authentication can be achieved with 
both symmetric and asymmetric cryptosystems.
Be familiar with the basic terminology of cryptography. 
When a sender wants to transmit a 
private message to a recipient, the sender takes the plaintext (unencrypted) message and en-
crypts it using an algorithm and a key. This produces a ciphertext message that is transmitted 
to the recipient. The recipient then uses a similar algorithm and key to decrypt the ciphertext 
and re-create the original plaintext message for viewing.
Understand the difference between a code and a cipher and explain the basic types of
ciphers. 
Codes are cryptographic systems of symbols that operate on words or phrases and 
are sometimes secret but don’t always provide confidentiality. Ciphers, however, are always 
meant to hide the true meaning of a message. Know how the following types of ciphers 
work: transposition ciphers, substitution ciphers (including one-time pads), stream ciphers, 
and block ciphers.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   223   224   225   226   227   228   229   230   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish