Defining cryptography and explaining the four cryptographic services: confidentiality, integrity, authentication, and nonrepudiation
Explaining the basic operation and uses of symmetric encryption algorithms and identifying the common algorithms in use today
Explaining the basic operation and uses of asymmetric encryption algorithms and identifying the common algorithms in use today
Explaining how hash functions provide data integrity and listing common hash functions in use today
Defining digital signatures and explaining how they provide identity and integrity
Configuring Cisco CallManager for security is relatively straightforward; however, the underlying security services, algorithms, and operations are often not well-known to the Cisco CallManager administrators who must secure the Cisco CallManager installation. This chapter provides information about cryptographic fundamentals. It helps you understand the elements that are the basis of cryptography in the data world.