Protocols are used to define how systems communicate. In this video, explore protocols that make use of cryptography to secure their communications.
- [Instructor] Cryptography can be used…to secure communications that happened across networks.…But before we started to leverage cryptography…those communications there were a lot of very popular…prevalent protocols that didn't use cryptography…and for those reasons have become security no-nos.…The first is File Transfer Protocol,…commonly referred to as FTP.…Next we have the Simple Mail Transfer Protocol, SMPT,…Hyper Text Transport Protocol, HTTP, and Telnet.…And while all of these protocols…are still relatively popular,…in the cybersecurity community they're considered…protocol no-nos because they don't offer…a appropriate level of cybersecurity protection…when transmitting sensitive information.…
So these protocols have been replaced…with newer, more secure protocols.…First we have S/MIME, also known as Secure MIME,…and it added digital signatures…and public key encryption to emails.…It does that through supporting X.509 certificates…and RSA encryption.…Then we have Pretty Good Privacy, more commonly called PGP.…
Released
12/9/2019Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312-50) version 10.
- Different types of cryptography
- Symmetric and asymmetric encryption
- Cryptographic hashing
- How digital certificates work
- Public key infrastructure (PKI) components
- Protocols that use cryptography
- Common types of cryptographic attacks
Share this video
Embed this video
Video: Protocols that use cryptography