Page 422 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 422

Chapter 7

               PKI and Cryptographic Applications


               THE CISSP EXAM TOPICS COVERED IN THIS CHAPTER

               INCLUDE:

                      Domain 3: Security Architecture and Engineering

                        3.9 Apply cryptography

                             3.9.1 Cryptographic lifecycle (e.g., key management,
                             algorithm selection)

                             3.9.2 Cryptographic methods

                             3.9.3 Public Key Infrastructure (PKI)

                             3.9.4 Key management practices

                             3.9.5 Digital signatures


                             3.9.6 Nonrepudiation

                             3.9.7 Integrity

                             3.9.8 Understand methods of cryptanalytic attacks

                             3.9.9 Digital Rights Management (DRM)













                                       In Chapter 6, “Cryptography and Symmetric Key
               Algorithms,” we introduced basic cryptography concepts and explored
               a variety of private key cryptosystems. These symmetric cryptosystems

               offer fast, secure communication but introduce the substantial
               challenge of key exchange between previously unrelated parties.

               This chapter explores the world of asymmetric (or public key)
   417   418   419   420   421   422   423   424   425   426   427