- Encryption uses a key or pair of keys.…When we encrypt a message, we can decrypt the message…as long as we have a key.…A hash is different in that it is one way.…You can not generate the original message from the hash.…We use hash in a number of different applications,…including authenticating a message,…monitoring data integrity,…and storing passwords.…
A hash takes a variable length input…and generates a fixed length output,…depending on the algorithm…and the compression function used.…Now there are certain cryptographic requirements…for a hash algorithm.…It can be applied to a block of data of any size.…It creates a fixed-sized output.…It is easy to compute.…And it has a strong collision resistance…in that no two hashes will be the same.…
There are two popular hash algorithms.…One is Secure Hash Algorithm, or SHA.…This was developed by NIST and produces…a hash value of 160 bits.…It's used frequently on the internet.…Message Digest Algorithm, MD5,…is a widely used cryptographic hash…which produces a hash value of 128 bits.…
Author
Released
8/12/2015- Differentiate between confidentiality, integrity, and accountability.
- Compare symmetric and asymmetric encryption.
- Describe the Feistel Cipher.
- Differentiate between block and stream ciphers.
- Explain what Secure Sockets Layer (SSL) is used for.
- Define Internet Protocol Security (IPSec) and explain how it works.
- Explain the transport mode in IPSec.
Skill Level Intermediate
Duration
Views
Related Courses
-
Introduction
-
Welcome1m 17s
-
-
1. Network Security
-
2. Symmetric Encryption
-
Using Wireshark to crack WEP4m 17s
-
3. Asymmetric Encryption and Digital Signatures
-
Managing keys3m 38s
-
Using certificates3m 3s
-
4. Hash Algorithms, Message Digests, and Authentication
-
5. Secure Sockets Layer (SSL)
-
6. Email Security
-
7. Internet Protocol Security
-
Using operating mechanisms3m 16s
-
Conclusion
-
Next steps55s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Diving into hash algorithms and message digests