Join Stephanie Domas for an in-depth discussion in this video Different types of ciphers, part of Ethical Hacking: Cryptography.
- [Narrator] Ciphers are the algorithms used…for encryption and decryption.…Before we get into some, I want to level set on some key terms…you're going to hear these over and over again…so an understanding of what they mean is paramount.…So plain text always refers to the original text,…the unscrambled protects the thing we're trying to encrypt.…The algorithm is then that mathematical mutation…we do on that plain text to get it into its garbled form.…The key is some kind of a unique piece of information…or knowledge that is used to guide the algorithm…in unique way.…
And then ciphertext is, essentially,…a name for that garbled text,…so the result of me encrypting plain text…through an algorithm with a key, is ciphertext.…So let's talk about some classic ciphers first.…The first one is the substitution cipher.…You'll often hear this actually referred to…as the Caesar cipher and that's actually because…Julius Caesar used this cipher technique…to have messages sent back to Rome…in an encrypted format.…You can very much think of this as a decoder ring,…
Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312-50) version 10.
- Different types of cryptography
- Symmetric and asymmetric encryption
- Cryptographic hashing
- How digital certificates work
- Public key infrastructure (PKI) components
- Protocols that use cryptography
- Common types of cryptographic attacks