# Introduction - Cryptography and wireless security

## Chapter 5: Cryptography and wireless security

This chapter covers how SSL/TLS uses cryptographic tools (symmetric encryption, asymmetric encryption, and hashing) to secure data over the Internet, and how the IEEE 802.11 standard provides a basis for a wireless security management framework (client authentication, message privacy, and message integrity).

**This chapter will help students:**

* Develop a foundational understanding of how cryptographic tools (symmetric encryption, asymmetric encryption, and hashing) secure Internet communications via SSL/TLS.
* Understand how symmetric encryption (e.g., AES), asymmetric encryption (e.g., RSA), and hashing (e.g., SHA-256) secure data in transit.
* Describe how digital certificates and asymmetric keys enable authentication and message signing.
* Develop a practical understanding of RSA’s key generation, encryption, and signing capabilities.
* Describe the TLS handshake process, from negotiating cryptographic parameters to securely establishing a shared session key.
* Develop a practical understanding of the Diffie-Hellman key exchange, its role in providing forward secrecy in TLS, and the underlying mathematics that make it secure.
* Understand how the IEEE 802.11 standard provides a basis for a wireless security management framework (client authentication, message privacy, and message integrity).
* Become familiar with key authentication methods and encryption and message integrity algorithms used in securing wireless networks.
* Compare wireless security protocols (WPA/WPA2/WPA3) and their authentication and encryption methods.

## Topics covered in this chapter

[Hashing algorithms and message integrity](https://dti-techs.gitbook.io/practical-foundations-in-cybersecurity/5.-cryptography-and-wireless-security/hashing-algorithms-and-message-integrity)

[Cryptographic encryption and confidentiality](https://dti-techs.gitbook.io/practical-foundations-in-cybersecurity/5.-cryptography-and-wireless-security/cryptographic-encryption-and-confidentiality)

[Message signing using asymmetric keys](https://dti-techs.gitbook.io/practical-foundations-in-cybersecurity/5.-cryptography-and-wireless-security/message-signing-using-asymmetric-keys)

[Cryptographic authentication methods](https://dti-techs.gitbook.io/practical-foundations-in-cybersecurity/5.-cryptography-and-wireless-security/cryptographic-authentication-methods)

[The SSL/TLS handshake](https://dti-techs.gitbook.io/practical-foundations-in-cybersecurity/5.-cryptography-and-wireless-security/the-ssl-tls-handshake)

[How SSL/TLS uses cryptography](https://dti-techs.gitbook.io/practical-foundations-in-cybersecurity/5.-cryptography-and-wireless-security/how-ssl-tls-uses-cryptography)

[Replay attacks and anti-replay methods](https://dti-techs.gitbook.io/practical-foundations-in-cybersecurity/5.-cryptography-and-wireless-security/replay-attacks-and-anti-replay-methods)

[Wireless client authentication methods](https://dti-techs.gitbook.io/practical-foundations-in-cybersecurity/5.-cryptography-and-wireless-security/wireless-client-authentication-methods)

[Wireless privacy and integrity methods](https://dti-techs.gitbook.io/practical-foundations-in-cybersecurity/5.-cryptography-and-wireless-security/wireless-privacy-and-integrity-methods)

[Authentication and encryption in WPA, WPA2, and WPA3](https://dti-techs.gitbook.io/practical-foundations-in-cybersecurity/5.-cryptography-and-wireless-security/authentication-and-encryption-in-wpa-wpa2-and-wpa3)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://dti-techs.gitbook.io/practical-foundations-in-cybersecurity/5.-cryptography-and-wireless-security/introduction-cryptography-and-wireless-security.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
