- Summarize how a linear feedback shift register operates.
- Identify the type of cipher used along with additional algorithms in the Data Encryption Standard (DES).
- Explain why the AES Standard is superior to the DES Standard.
- Recognize the most important characteristic of the RC4 Cipher.
- Describe the best way to encrypt more than one block.
- Recall how Cipher feedback is used.
- Compare and contrast Output Feedback (OFB) and Cipher Feedback (CFB).
- Recognize the important of Counter Block Mode (CTR).
Skill Level Advanced
- [Jeremy] My name is Jeremy Hanson, and I've been working in information security for more than 20 years. I've been an IT professional, a researcher, and a teacher working with a lot of very different organizations. We use cryptography every day. As a web developer, you expect SSL certificates to protect your application's sensitive traffic. As a network engineer, you set up VPN connections between devices. As a systems support technician, you rely on full-disk encryption to keep laptops and mobile devices safe. Most professionals are aware of some aspects of cryptography, but many take it for granted.
Most people installing an SSL certificate just set it and forget it. This course is designed to give you an introduction to how cryptography works under the hood, no matter what your role is. We won't go too deep into the math. I'll focus on the core ideas behind cryptography, and I'll explain the building blocks of modern systems. There's a lot to cover in the field of cryptography, but symmetric cryptography is the place to start. We'll look at the most common symmetric algorithms to understand how we're really securing our data. If you better understand how your cryptography is working, you can make better choices about how you use it, whether you're developing a secure application, choosing a product that protects your clients' data, or if you're wanting to know more about how your personal information is being stored.