Cyber Security

Unit 1 • Chapter 3

Cryptography Essentials

Summary

false

Concept Check

What is a symmetric encryption algorithm?

What is the public key used for in asymmetric cryptography?

What is the main purpose of digital signatures in cryptography?

What is the key difference between block ciphers and stream ciphers?

What is a rainbow table in the context of cryptography attacks?