Chapter 6: Working with Cryptography and PKI
As many people and devices are connecting to the internet and we are all sharing data, privacy is a major concern for all. Imagine sending a confidential file to a friend across the internet, but you're concerned about whether a threat actor is intercepting your communication and viewing your messages. To keep your data secure, cryptography is used to ensure that only an authorized person has access to the data. With cryptography, we can encrypt our messages to keep them private from unauthorized parties such as threat actors. Even if a threat actor is able to capture our encrypted data, the attacker will not be able to view the contents of the encrypted message.
Throughout this chapter, you will learn about various encryption standards and algorithms, and how they are used to provide data confidentiality on a network. Additionally, you will discover the techniques that threat actors use to retrieve the secret key and break the...