- Hash values are helpful in providing…quality digital communication.…We can provide Integrity.…This ensures the message has not…been modified in transit.…For this, we use a hash.…Authentication, ensures the message…originates from the sender.…From this, we use the same shared key…and create a message Authentication code.…A non-repudiation and accountability.…This ensures the message originated…from the sender but here we use a digital signature.…
And a public key and a private key.…Keep in mind the services do not provide…confidentiality as the messages are not encrypted.…Lets look at Integrity.…With Integrity, a hash creates a fingerprint…of the original message.…And this is called a Message Digest.…How this works.…Well we start out with the original message…as we see in yellow.…We create the hash value which is called the Digest…and attach it to the message.…
This is then transmitted to the sender.…The sender then takes the original message…and creates a Digest.…Pulls of the Digest that was sent and compare.…If they're equal, then we know that…
Author
Released
8/12/2015- Differentiate between confidentiality, integrity, and accountability.
- Compare symmetric and asymmetric encryption.
- Describe the Feistel Cipher.
- Differentiate between block and stream ciphers.
- Explain what Secure Sockets Layer (SSL) is used for.
- Define Internet Protocol Security (IPSec) and explain how it works.
- Explain the transport mode in IPSec.
Skill Level Intermediate
Duration
Views
Related Courses
-
Introduction
-
Welcome1m 17s
-
-
1. Network Security
-
2. Symmetric Encryption
-
Using Wireshark to crack WEP4m 17s
-
3. Asymmetric Encryption and Digital Signatures
-
Managing keys3m 38s
-
Using certificates3m 3s
-
4. Hash Algorithms, Message Digests, and Authentication
-
5. Secure Sockets Layer (SSL)
-
6. Email Security
-
7. Internet Protocol Security
-
Using operating mechanisms3m 16s
-
Conclusion
-
Next steps55s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Looking deeper into message digests