From the course: Symmetric Cryptography Essential Training
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Symmetric keys
From the course: Symmetric Cryptography Essential Training
Symmetric keys
- [Instructor] Let's dive right in. First, we have a message, sometimes called the plaintext or the clear text. This is most often represented with the capital letter M. This is the unencrypted thing that we want to protect. Then there's the cipher text, which is the scrambled version of the plaintext. This is often represented as a capital C. And finally we have the key, which will be represented by a capital K. We shouldn't be able to get the original message back from a cipher text without this key. Algorithms. Here's a term that gets used a lot, but might not be well understood. An algorithm is a well-defined sequence of instructions operating upon an input to produce an output. Think of an algorithm like a recipe. You take some ingredients, the inputs, you follow some steps, like chopping or cooking and so on, and then you get your output, the dish that you wanted. Cryptographic algorithms are just recipes that let us do things like encrypt messages, verify the integrity of data,…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.