Abstract
There has always been a need to keep data confidential while at rest and while in transit. So far, there have been various ways and techniques used for keeping data confidential; however, these techniques have become more complex and robust with advancements in computing technology. This chapter introduces key concepts in cryptography along with its practical applications.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsAuthor information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Sagar Ajay Rahalkar
About this chapter
Cite this chapter
Rahalkar, S.A. (2016). Cryptography. In: Certified Ethical Hacker (CEH) Foundation Guide. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2325-3_14
Download citation
DOI: https://doi.org/10.1007/978-1-4842-2325-3_14
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-2324-6
Online ISBN: 978-1-4842-2325-3
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books