Learn about differentiating between symmetric and asymmetric encryption and how they can be used together.
- [Male] Having a solid understanding of SSL and TLS…stems from understanding symmetric…and asymmetric encryption.…So let's talk about both of these,…starting with symmetric encryption.…Symmetric encryption uses a single "secret" key,…and that secret key is used to both encrypt and decrypt.…And so all parties then need access to that key…to partake in this encryption and decryption.…At the same time the key needs to be kept secure,…because one of the issues with symmetric encryption…is that if that key gets compromised,…all of the data that was encrypted with that key…is also compromised.…
Another problem is, how can we safely distribute…that single key, on a large scale?…There's no easy way to do that, unto itself.…However, we can use other technologies…like asymmetric encryption, to do this.…And we'll talk about asymmetric encryption…in just a few minutes.…First, let's chat about symmetric encryption algorithms.…There are plenty of them out there,…we'll just state a couple of the common ones.…Starting with AES.…
Author
Released
2/21/2019- Symmetric and asymmetric encrypting
- How certificates are issued and managed
- Configuring a Linux OpenSSL PKI environment
- How TLS supersedes SSL and is considered more secure
- Acquiring a web server certificate
- Acquiring a code-signing certificate
- Configuring a website with a certificate
- Securing files and folders with EFS
- Configuring a TLS VPN
Skill Level Beginner
Duration
Views
Related Courses
-
Learning Cryptography and Network Security (2015)
with Lisa Bock1h 45m Intermediate
-
Introduction
-
What you should know2m 5s
-
1. PKI Overview
-
Cryptography overview4m 47s
-
PKI hierarchy4m 47s
-
Certificate authorities6m 29s
-
Certificates8m 11s
-
-
2. PKI CA Implementation
-
3. PKI Certificate Acquisition
-
SSL vs. TLS9m 50s
-
-
4. PKI Certificate Usage
-
Configure a TLS VPN8m 12s
-
Conclusion
-
Next steps1m 9s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Symmetric and asymmetric encrypting