Chapter 7 – Symmetric Cryptography and Hashing Section 2 – Historical Uses of Cryptography Certified Information Systems Security Officer P a g e | 338 ©Mile2 – All Rights Reserved - v18