From the course: CISA Cert Prep: 5 Information Asset Protection for IS Auditors

Unlock the full course today

Join today to access over 22,400 courses taught by industry experts or purchase this course individually.

Cryptography overview: Part 2

Cryptography overview: Part 2

From the course: CISA Cert Prep: 5 Information Asset Protection for IS Auditors

Start my 1-month free trial

Cryptography overview: Part 2

- [Instructor] Alright, well, let's talk about crypto algorithms number two. This is the second part in our crypto algorithms piece. So, last time we talked about symmetric algorithms. Let's talk about asymmetric algorithms. So, asymmetric, of course, means something is different on both sides. If you chop it in half, you have two different things on both sides. And with asymmetric cryptography, we have a mathematically related key pair. We have a private key and a public key that are created together and then separated, right? They are mathematically related, so they've derived from a special, sort of, magical algorithm. And anything that you encrypt with one key can only be decrypted with the other key. You can't decrypt it with the same key. If I use the public key to encrypt something, I can only use the private key to decrypt it. The public key is useless for decrypting it. If I use the private key to encrypt something, I can't use that key to decrypt it. I've got to use the…

Contents