Lisa Bock discusses asymmetric encryption and the many uses that include key exchange, confidentiality using encryption, authentication functions using the Public Key Infrastructure (PKI), and creating digital signatures.
- [Narrator] Symmetric encryption provides fast,…efficient encryption.…However it requires both the sender…and receiver have the same shared key,…which can be a problem in a complex networked environment.…Asymmetric encryption is also called public key encryption…and it uses two keys that are mathematically related.…A public key that you publish and share,…and a private key that you keep private.…
Scientists developed asymmetric encryption in the 1970s…as a need for securely exchanging a secret key…became evident.…Let's step through the process of encrypting data…that only Bob should see using asymmetric encryption.…We start with Alice sending a secret message to Bob…with plain text input.…And now, we take Bob's public key…and the encrypting algorithm.…It then becomes cipher text.…
It's sent to Bob who uses Bob's private key…and the decryption algorithm…it then becomes plain text output,…and because only Bob has Bob's private key,…only Bob can see the contents.…Asymmetric or public key encryption algorithms…include RSA or PGP.…
- Security principles and terms
- SIEM technology
- Common security threats
- Social engineering
- Data loss prevention
- Cryptographic concepts
- Symmetric and asymmetric encryption
- Hash algorithms
- Network topologies, CAN, WAN, and SOHO
- Securing a virtual environment
Skill Level Intermediate
Cisco ICND2 Cert Prep: Switchingwith Russell Long2h 20m Intermediate
CCNA Security (210-260) Cert Prep: 2 Secure Accesswith Lisa Bock1h 25m Intermediate
CCNA Security (210-260) Cert Prep: 3 VPNwith Lisa Bock1h 27m Intermediate
1. Security Principles
2. Common Security Threats
4. Describe Network Topologies
Next steps1m 9s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.