CISSP Domain 3 — Architecture and Engineering
3.6 Select and Determine Cryptographic Solutions
Cryptography provides the technical foundation for confidentiality, integrity, and non-repudiation. This section covers the selection, implementation, and management of cryptographic systems throughout their lifecycle.
-
» Cryptographic life cycle (e.g., keys, algorithm selection)
-
» Cryptographic methods (e.g., symmetric, asymmetric, elliptic curves, quantum)
-
» Public key infrastructure (PKI) (e.g., quantum key distribution)
-
» Key management practices (e.g., rotation)
-
» Digital signatures and digital certificates (e.g., non-repudiation, integrity)
Reference: CISSP Certification Exam Outline