Security professionals use cryptography for several different reasons. We describe those reasons using the four goals of cryptography. In this video, you can learn how cryptographers work to achieve the four major goals of cryptography: confidentiality, integrity, authentication, and non-repudiation.
- [Narrator] Security professionals use cryptography…for several different reasons.…These are sometimes driven by corporate policy…and sometimes by regulatory requirements.…No matter what the driving force,…there are four main goals of cryptography.…First, the most common goal of cryptography…is to preserve confidentiality.…Confidentiality ensures that unauthorized individuals…are not able to gain access to sensitive information.…If Alice and Bob are communicating with each other…using encryption, they want to ensure…that their communication remains private.…
And even if a third party intercepts their communication,…that third party is unable to read the contents.…When we use cryptography to protect…the confidentiality of information,…we consider three different states of data…where it might be exposed to prying eyes.…Data at rest is data stored on a hard drive…or other storage device.…We can use encryption to protect stored data…so that it remains protected…even if the device is lost or stolen.…Data in transit is being sent over a network…
To join one of Mike's free study groups for access to bonus tips and practice questions, visit certmike.com.
- Choosing an encryption algorithm
- Symmetric cryptography
- Data Encryption Standard
- Asymmetric cryptography
- Key management, including key exchange
- Public key infrastructure
- Transport encryption
- Cryptanalytics attacks
Skill Level Intermediate
Q: This course was updated on 07/27/2018. What changed?
A: The following topic was updated: goals of cryptography. In addition, a new video was added that covers DKIM.
Learning Cryptography and Network Securitywith Lisa Bock1h 45m Intermediate
Cybersecurity with Cloud Computingwith Malcolm Shore2h 25m Intermediate
2. Symmetric Cryptography
3. Asymmetric Cryptography
4. Key Management
5. Public Key Infrastructure
6. Transport Encryption
7. Cryptanalytic Attacks
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.