From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
The cryptographic lifecycle
From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering
The cryptographic lifecycle
- [Instructor] Cryptographic algorithms and the keys used to secure information protected by cryptographic algorithms are among the most important components of any security program. Cybersecurity professionals must have a strong understanding of the cryptographic lifecycle to better select, maintain, and decommission the use of algorithms as the security needs of the organization and the threat environment change. As cryptographic algorithms age, they often become insecure, either because researchers discover flaws in their implementation or because the key length they use becomes vulnerable to brute force attacks. Therefore, it's important to have a lifecycle approach to cryptography that phases algorithms out as they become insecure. The National Institute of Standards and Technology, NIST, offers a five-stage cryptographic lifecycle that organizations should apply to any use of cryptography and their enterprise.…
Contents
-
-
-
-
-
-
-
-
-
(Locked)
Understanding encryption2m 49s
-
(Locked)
Symmetric and asymmetric cryptography4m 18s
-
(Locked)
Goals of cryptography3m 47s
-
(Locked)
Codes and ciphers3m 5s
-
(Locked)
Cryptographic math2m 38s
-
(Locked)
Choosing encryption algorithms3m 27s
-
(Locked)
The perfect encryption algorithm3m 21s
-
(Locked)
The cryptographic lifecycle2m 34s
-
(Locked)
-
-
-
-
-
-
-
-
-