CISSP · · 4 min read

Cryptography Essentials for Security Architects: What You Must Know Without Being a Mathematician

Cryptography for architects, not mathematicians. Symmetric, asymmetric, hashing, and digital signatures explained for CISSP Domain 3.

Hook / Why This Matters

CISSP Lens: Pick answers that align business risk, governance intent, and practical control execution.

Cryptography is the most math-heavy topic in the CISSP, and also the one where architects make the most consequential mistakes. You do not need to implement AES. You do need to know when to use it, when not to, and why key management matters more than algorithm choice.

Core Concept Explained Simply

Cryptography provides four core security services: confidentiality, integrity, authentication, and non-repudiation. Different cryptographic mechanisms provide different combinations of these services, and choosing the right mechanism for the right requirement is the architect's job.

Symmetric Encryption

Symmetric encryption uses one key for both encryption and decryption. It is fast and efficient, making it the standard for encrypting bulk data. The primary algorithms you need to know are:

The fundamental limitation of symmetric encryption is key distribution. Both parties need the same key, and transmitting that key securely is a challenge that asymmetric cryptography solves.

Asymmetric Encryption

Asymmetric encryption uses a key pair: a public key and a private key. Data encrypted with one key can only be decrypted with the other. It is much slower than symmetric encryption but solves the key distribution problem.

Hashing

Hash functions produce a fixed-length output (digest) from any input. They are one-way functions, meaning you cannot reverse the hash to recover the original data.

Hashing provides integrity verification but not confidentiality. It tells you whether data has been modified, but it does not hide the data.

Digital Signatures

Digital signatures combine hashing and asymmetric cryptography to provide authentication, integrity, and non-repudiation in one mechanism. The signer hashes the message and encrypts the hash with their private key. The recipient decrypts with the signer's public key and compares hashes.

This is the only standard mechanism that provides non-repudiation, because only the private key holder could have created the signature.

HMAC vs. Digital Signatures

HMAC (Hash-based Message Authentication Code) uses a shared secret key with a hash function to provide integrity and authentication. However, because both parties share the same key, HMAC does not provide non-repudiation. Either party could have generated the HMAC.

Hybrid Cryptosystems

In practice, systems use both symmetric and asymmetric cryptography together. Asymmetric cryptography exchanges or protects the symmetric key, and the symmetric key encrypts the actual data. TLS, PGP, and S/MIME all work this way.

CISSP Lens

The exam tests your ability to match cryptographic mechanisms to security requirements:

Know that symmetric encryption is faster but has a key distribution problem. Know that digital signatures provide non-repudiation while HMAC does not. Know that encryption alone does not provide integrity unless you use authenticated encryption (like AES-GCM).

Real-World Scenario

A development team encrypted sensitive API payloads using AES in ECB (Electronic Codebook) mode. ECB encrypts each block independently with the same key, which means identical plaintext blocks produce identical ciphertext blocks. When security researchers analyzed the encrypted traffic, they could see patterns in the data that revealed structural information about the payloads.

The team switched to AES-GCM (Galois/Counter Mode), which solved two problems at once. GCM is a stream-oriented mode that does not leak patterns, and it provides built-in authentication, verifying both confidentiality and integrity of the ciphertext. An architectural review process that included cryptographic design review would have caught the ECB choice before deployment.

Common Mistakes and Misconceptions

Actionable Checklist

Key Takeaways

Exam-Style Reflection Question

An organization needs to ensure that a message was sent by a specific individual and has not been modified. Which cryptographic mechanism best meets both requirements?

Answer: A digital signature. It provides authentication (verifying the sender), integrity (detecting modification), and non-repudiation (the sender cannot deny sending it). Encryption alone does not provide integrity or non-repudiation. HMAC provides integrity and authentication but not non-repudiation.

Read next

© 2025 Threat On The Wire. All rights reserved.