Cryptography is one of the most technically dense topics on the CISSP exam. Domain 3 tests cryptographic concepts at the level of: how do the different types of cryptography work, when is each appropriate, how does PKI establish trust, and what threats — including emerging quantum threats — does the exam expect you to understand? The exam does not require you to implement cryptographic algorithms, but it does require deep conceptual understanding of their properties, use cases, and vulnerabilities.

Symmetric Cryptography

Symmetric cryptography uses the same key for both encryption and decryption. Both parties must possess the same secret key, and the security of the communication depends entirely on the secrecy of that key.

Strengths of symmetric cryptography: it is computationally fast, making it practical for encrypting large volumes of data. Modern symmetric algorithms (AES-256, ChaCha20) are extremely secure against brute force attacks given adequate key lengths.

Weaknesses of symmetric cryptography: the key distribution problem. How do two parties who have never met agree on a shared secret key without it being intercepted? In small-scale deployments (two parties with a pre-existing secure channel), this is manageable. At scale (thousands of parties communicating with each other), key distribution becomes practically impossible without a more sophisticated mechanism.

The key management challenge is quantified by the formula for the number of keys required for n parties to communicate privately: n(n-1)/2. For 1,000 parties, this is 499,500 symmetric keys — clearly unmanageable.

Major symmetric algorithms: AES (Advanced Encryption Standard) — the current standard for symmetric encryption, with key lengths of 128, 192, or 256 bits. 3DES (Triple DES) — deprecated but may appear in legacy scenarios. ChaCha20 — a modern stream cipher used in TLS 1.3. RC4 — deprecated, known-vulnerable stream cipher.

For the exam: symmetric = fast = used for bulk data encryption. The fundamental challenge is key distribution at scale.

Asymmetric Cryptography