Introduction to Cryptography part2 - Asymmetric vs Symmetric Encryption
This is the second of my videos on an introduction to cryptography. My earlier video gave a brief overview of cryptography, some of the history behind crypto...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Thailand under the topic 'สภาพอากาศ'.
About this video
This is the second of my videos on an introduction to cryptography. My earlier video gave a brief overview of cryptography, some of the history behind cryptography and an example using ROT13.
Part 1 about Cryptography, history and importance:
https://youtu.be/is31vSjddCM
In this video I’ll look at the importance on cryptography today and some additional concepts relevant to modern security.
The video includes the importance of cryptography in the CIA security triad.
Cryptography in various states at rest, in use, in transit.
Encryption algorithms. Kerckhoff's principle vs security by obscurity.
Differences between codes and ciphers.
For more details see:
http://www.penguinfortress.com/security/cryptography
Chapters:
00:00 Introduction to Cryptography
00:23 Importance of Cryptography
01:47 Encryption Algorithms
03:01 Codes and Ciphers
06:38 Symmetric Key Encryption
07:20 Asymmetric Key Encryption
10:29 Hashes
11:07 Digital Signatures
12:25 Summary
#cybersecurity #cryptography
Video Information
Views
253
Total views since publication
Likes
2
User likes and reactions
Duration
13:11
Video length
Published
Feb 9, 2023
Release date
Quality
hd
Video definition
Captions
Available
Subtitles enabled
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#cyber #security #it #password #username #safety #cissp #exam #study #revision #hacking #cracking #encryption #decryption #hashes #hash #signature #nonrepudiation #alice #bob #eve #evesdropping #secure #communication #Kerckhoff's principle #obscurity #public #private #key #keys #shared #symmetric #assymetric #protocol #transfer #data #confidentiality #protect #corrupt #integrity #pki
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.