Strong encryption is very difficult to defeat and this causes a problem for law enforcement and other government agencies who feel that they have a right to access encrypted communications. In this video, learn about the concept of key escrow and the challenges that key escrow poses to security and privacy.
- [Narrator] Strong encryption is very difficult to defeat,…and this causes a problem for law enforcement…and other government agencies,…who feel that they have a right…to access encrypted communications…under certain circumstances,…such as when they obtain a search warrant.…That's where the concept of key escrow comes into play.…Just like a financial escrow accountant at a bank,…the concept of escrow here means that someone…is holding something,…for use by someone else,…if use for certain conditions are met.…In this case,…government officials have proposed key escrow technologies…that would provide law enforcement with access…to encrypted information.…
The idea is that government agents…would have to obtain a court order…before accessing escrowed keys,…thus protecting the privacy of other individuals.…While this may be a reasonable goal,…there is not yet a reasonable way…to implement this approach in a secure manner.…Perhaps the most concerted effort to deploy…key escrow technology occurred in 1993,…when the government proposed a technology…
Author
Released
2/12/2018- Symmetric and asymmetric cryptography
- Reviewing the four major goals of cryptography
- Cryptographic math
- Choosing encryption algorithms
- Symmetric cryptography
- Common cipher modes
- Elliptic curve and quantum cryptography
- Public key infrastructure
- Creating and revoking a digital certificate
- Brute force and knowledge-based attacks
- Digital rights management
Skill Level Beginner
Duration
Views
Related Courses
-
IT Security Foundations: Core Concepts
with Lisa Bock1h 13m Beginner -
Insights from a Cybersecurity Professional
with Mike Chapple32m 15s Appropriate for all
-
Introduction
-
Welcome1m 1s
-
-
1. Encryption
-
Understanding encryption3m 24s
-
Goals of cryptography3m 32s
-
Codes and ciphers3m 32s
-
Cryptographic math3m 2s
-
The cryptographic lifecycle2m 49s
-
-
2. Symmetric Cryptography
-
Data encryption standard3m 19s
-
3DES3m 35s
-
AES, Blowfish, and Twofish6m 40s
-
RC42m 23s
-
Cipher modes3m 36s
-
Steganography4m 55s
-
-
3. Asymmetric Cryptography
-
Rivest-Shamir-Adleman (RSA)3m 26s
-
PGP and GnuPG11m 9s
-
-
4. Key Management
-
Key exchange3m 4s
-
Diffie-Hellman5m 43s
-
Key escrow3m 13s
-
Key stretching1m 55s
-
-
5. Public Key Infrastructure
-
Trust models3m 1s
-
PKI and digital certificates4m 28s
-
Hash functions9m 11s
-
Digital signatures4m 4s
-
Digital signature standard1m 43s
-
Create a digital certificate4m 33s
-
Revoke a digital certificate1m 48s
-
Certificate stapling2m 55s
-
Certificate authorities7m 3s
-
Certificate subjects3m 57s
-
Certificate types5m 12s
-
Certificate formats2m 46s
-
-
6. Cryptanalytic Attacks
-
Brute force attacks3m 12s
-
Knowledge-based attacks2m 23s
-
-
7. Cryptographic Applications
-
Digital rights management2m 17s
-
Specialized use cases2m 33s
-
-
Conclusion
-
Next steps15s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Key escrow