CISA Exam: Key Concepts of Asymmetric Encryption (Domain-5)

Important points for the CISA exam: In scenarios where the objective is to ensure 'confidentiality', messages must be encrypted using the receiver's public key.

CISA Exam: Key Concepts of Asymmetric Encryption (Domain-5)
Hemang Doshi
31.3K views ‱ Nov 5, 2016
CISA Exam: Key Concepts of Asymmetric Encryption (Domain-5)

About this video

Point to remember for CISA exam:

(1)In any given scenario, when objective is to ensure ‘confidentiality’, message has to be encrypted using receiver’s public key.

(2)In any given scenario, when objective is to ensure ‘authentication’, HASH of the message has to be created and HASH to be encrypted using sender’s private key. Please note that hash is also known as message digest.

(3)In any given scenario, when objective is to ensure ‘integrity’, HASH of the message has to be created and HASH to be encrypted using sender’s private key. Please note that hash is also known as message digest.

(4)In any given scenario, when objective is to ensure ‘confidentiality & authentication’, following treatment is required:

-Hash of the message to be encrypted using sender’s private key (to ensure authentication/non-repudiation)
-Message to be encrypted using receiver’s public key (to ensure confidentiality)

(5)In any given scenario, when objective is to ensure ‘confidentiality & authentication & integrity’, following treatment is required:

-Message to be encrypted using receiver’s public key (to ensure confidentiality)
-Hash of the message to be encrypted using sender’s private key (to ensure authentication/non-repudiation and integrity)

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

31.3K

Likes

319

Duration

17:33

Published

Nov 5, 2016

User Reviews

4.4
(6)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.