From the course: Symmetric Cryptography Essential Training

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Symmetric keys

Symmetric keys

From the course: Symmetric Cryptography Essential Training

Start my 1-month free trial

Symmetric keys

- [Instructor] Let's dive right in. First, we have a message, sometimes called the plaintext or the clear text. This is most often represented with the capital letter M. This is the unencrypted thing that we want to protect. Then there's the cipher text, which is the scrambled version of the plaintext. This is often represented as a capital C. And finally we have the key, which will be represented by a capital K. We shouldn't be able to get the original message back from a cipher text without this key. Algorithms. Here's a term that gets used a lot, but might not be well understood. An algorithm is a well-defined sequence of instructions operating upon an input to produce an output. Think of an algorithm like a recipe. You take some ingredients, the inputs, you follow some steps, like chopping or cooking and so on, and then you get your output, the dish that you wanted. Cryptographic algorithms are just recipes that let us do things like encrypt messages, verify the integrity of data,…

Contents