From the course: SSL/TLS for Beginners: Securing Network Communications

Unlock the full course today

Join today to access over 22,700 courses taught by industry experts or purchase this course individually.

Symmetric and asymmetric encrypting

Symmetric and asymmetric encrypting - Active Directory Tutorial

From the course: SSL/TLS for Beginners: Securing Network Communications

Start my 1-month free trial

Symmetric and asymmetric encrypting

- [Male] Having a solid understanding of SSL and TLS stems from understanding symmetric and asymmetric encryption. So let's talk about both of these, starting with symmetric encryption. Symmetric encryption uses a single "secret" key, and that secret key is used to both encrypt and decrypt. And so all parties then need access to that key to partake in this encryption and decryption. At the same time the key needs to be kept secure, because one of the issues with symmetric encryption is that if that key gets compromised, all of the data that was encrypted with that key is also compromised. Another problem is, how can we safely distribute that single key, on a large scale? There's no easy way to do that, unto itself. However, we can use other technologies like asymmetric encryption, to do this. And we'll talk about asymmetric encryption in just a few minutes. First, let's chat about symmetric encryption algorithms. There are plenty of them out there, we'll just state a couple of the…

Contents