Lisa Bock discusses hash functions, which are used in a number of different cryptographic applications, including authenticating a message, monitoring data integrity, and storing passwords.
- [Instructor] In addition to encryption,…cryptographic techniques such as hash functions…protect data, let's compare the two.…Encryption uses a key or pair of keys.…When we encrypt a message, we can decrypt the message…as long as we have a key.…A hash is different in that it is one way.…You can not generate the original message from the hash…while we use hash functions…in a number of different applications…including authenticating a message,…monitoring data integrity and storing passwords,…a hash algorithm takes a variable length input…and generates a fixed length output,…depending on the algorithm and the compression function used…in this graphic we see a small stump of data…called the message digest which is pulled over…and it is like a fingerprint of the message.…
There are two popular hash algorithms…one is secure hash algorithm or SHA-1,…which produces a hash value of 160 bits.…Other SHA functions include SHA-256 and SHA-384…which uses more bits and provides better security.…Message digest algorithm, or MD5 is a widely used…
- Security principles and terms
- SIEM technology
- Common security threats
- Social engineering
- Data loss prevention
- Cryptographic concepts
- Symmetric and asymmetric encryption
- Hash algorithms
- Network topologies, CAN, WAN, and SOHO
- Securing a virtual environment
Skill Level Intermediate
Cisco ICND2 Cert Prep: Switchingwith Russell Long2h 20m Intermediate
CCNA Security (210-260) Cert Prep: 2 Secure Accesswith Lisa Bock1h 25m Intermediate
CCNA Security (210-260) Cert Prep: 3 VPNwith Lisa Bock1h 27m Intermediate
1. Security Principles
2. Common Security Threats
4. Describe Network Topologies
Next steps1m 9s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.