There are two basic forms of cryptography: symmetric and asymmetric. In this video, Mike Chapple explains the difference between the two and how they are used on the dark web.
- [Instructor] There are many different kinds … of encryption algorithm … and there are different ways … that we can categorize those algorithms. … Two of the major categories are symmetric … and asymmetric algorithms. … YOu're probably already familiar … with the concept of symmetry … meaning that two things are the same. … Symmetric shapes have two sides … that when divided along an axis are identical. … Similarly, the structure of the human face is symmetric. … In cryptography, symmetry relates to keys … rather than shapes. … And we have two categories of encryption algorithms. … In symmetric encryption algorithms, … also known as shared-secret encryption algorithms, … the encryption and decryption operations use the same key. … If one user encrypts a message using the secret key apple, … a second user would have to decrypt the message … using that same key. … It's a shared secret. … A symmetric encryption algorithms on the other hand … use different keys for encryption and decryption. …
- What is the dark web and who uses it?
- The purpose of the Tor Browser
- Cryptography and perfect forward secrecy
- Installing the Tor Browser
- Accessing the standard internet with the Tor Browser
- Safeguarding privacy on Tor
- The role of hidden servers on the dark web
- Locating and accessing hidden websites
- Vulnerabilities in Tor