Phil Zimmerman invented the Pretty Good Privacy (PGP) cryptographic framework in 1991 and it became a widely used asymmetric cryptographic system when security developers released the OpenPGP standard for public use. PGP is not an encryption algorithm itself but it provides a framework for the use of those algorithms.
- View Offline
- [Narrator] Let's take a look at…another asymmetric algorithm.…In 1991, Phil Zimmerman released an algorithm…that he called the Pretty Good Privacy, or PGP, algorithm.…PGP is still widely used today…and the details are freely available…for anyone to use through the OpenPGP standard.…PGP uses public and private key pairs,…but it performs encryption and decryption…in a little more complex manner than other algorithms.…
It combines both symmetric and asymmetric cryptography.…Let's take a look at the encryption process using PGP.…The sender of a message has the original plain text…and then generates a random symmetric encryption key.…Next, the sender encrypts the message…using that random symmetric key…and then encrypts the random key…using the recipient's public key.…The sender then transmits the encrypted message,…which is a combination of the encrypted data…and the encrypted random key.…
When the recipient receives the encrypted message,…he or she performs the decryption process.…First, the recipient decrypts the encrypted…
Members who take all eight courses in the series will be prepared to take and pass the CISSP exam. Find the companion study books at the Sybex test prep site and review the complete CISSP Body of Knowledge at https://www.isc2.org/cissp-domains/default.aspx.
- Understanding security and evaluation models
- Cloud computing and virtualization
- Securing hardware
- Client and server vulnerabilities
- Web security vulnerabilities
- Securing mobile and smart devices
- Understanding encryption
- Key management and public key infrastructure
- Physical security
Skill Level Advanced
Essentials of Cryptography and Network Securitywith Lisa Bock1h 45m Intermediate
CISSP Cert Prep: 2 Asset Securitywith Mike Chapple58m 11s Advanced
1. Security Engineering
2. Cloud Computing and Virtualization
3. Hardware Security
4. Client and Server Vulnerabilities
5. Web Security
6. Mobile Security
7. Smart Device Security
9. Symmetric Cryptography
10. Asymmetric Cryptography
11. Key Management
12. Public Key Infrastructure
13. Cryptanalytic Attacks
14. Physical Security
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.