Encryption takes plain text and turns…it into cipher text by using a key…or a key pair.…The result is a meaningless message,…unless you have a key.…Now let's take and use an example.…For example, if I go to…atom.smasher.org/pgp…and input into the box, we can see encryption in action.…I will type "Encryption plays an essential role…in protecting electronic information…in many of today's businesses."…Now, Encrypt my message!…As you can see, the message would be meaningless…to anyone who does not have a key to decrypt the data.…
Today, encryption is the most effective way…to secure digital data.…There are Two Main Types of encryption.…Asymmetric encryption, also called public key encryption,…and symmetric encryption, also called…conventional encryption.…Most of the time, a hybrid cryptosystem is used…employing both methods.…Using encryption to protect data has been discussed…since the early 1980s.…As the internet became public in 1992, more serious…concerns over data protection and privacy surfaced.…
Take a look at this report published in 1996…
Author
Released
8/12/2015- Differentiate between confidentiality, integrity, and accountability.
- Compare symmetric and asymmetric encryption.
- Describe the Feistel Cipher.
- Differentiate between block and stream ciphers.
- Explain what Secure Sockets Layer (SSL) is used for.
- Define Internet Protocol Security (IPSec) and explain how it works.
- Explain the transport mode in IPSec.
Skill Level Intermediate
Duration
Views
Related Courses
-
Introduction
-
Welcome1m 17s
-
-
1. Network Security
-
2. Symmetric Encryption
-
Using Wireshark to crack WEP4m 17s
-
3. Asymmetric Encryption and Digital Signatures
-
Managing keys3m 38s
-
Using certificates3m 3s
-
4. Hash Algorithms, Message Digests, and Authentication
-
5. Secure Sockets Layer (SSL)
-
6. Email Security
-
7. Internet Protocol Security
-
Using operating mechanisms3m 16s
-
Conclusion
-
Next steps55s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Understanding why encryption is necessary