From the course: Ethical Hacking: Cryptography

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Protocols that use cryptography

Protocols that use cryptography

From the course: Ethical Hacking: Cryptography

Start my 1-month free trial

Protocols that use cryptography

- [Instructor] Cryptography can be used to secure communications that happened across networks. But before we started to leverage cryptography those communications there were a lot of very popular prevalent protocols that didn't use cryptography and for those reasons have become security no-nos. The first is File Transfer Protocol, commonly referred to as FTP. Next we have the Simple Mail Transfer Protocol, SMPT, Hyper Text Transport Protocol, HTTP, and Telnet. And while all of these protocols are still relatively popular, in the cybersecurity community they're considered protocol no-nos because they don't offer a appropriate level of cybersecurity protection when transmitting sensitive information. So these protocols have been replaced with newer, more secure protocols. First we have S/MIME, also known as Secure MIME, and it added digital signatures and public key encryption to emails. It does that through supporting…

Contents