CISA Exam: Key Concepts of Asymmetric Encryption (Domain-5)
Important points for the CISA exam: In scenarios where the objective is to ensure 'confidentiality', messages must be encrypted using the receiver's public key.

Hemang Doshi
31.3K views âą Nov 5, 2016

About this video
Point to remember for CISA exam:
(1)In any given scenario, when objective is to ensure âconfidentialityâ, message has to be encrypted using receiverâs public key.
(2)In any given scenario, when objective is to ensure âauthenticationâ, HASH of the message has to be created and HASH to be encrypted using senderâs private key. Please note that hash is also known as message digest.
(3)In any given scenario, when objective is to ensure âintegrityâ, HASH of the message has to be created and HASH to be encrypted using senderâs private key. Please note that hash is also known as message digest.
(4)In any given scenario, when objective is to ensure âconfidentiality & authenticationâ, following treatment is required:
-Hash of the message to be encrypted using senderâs private key (to ensure authentication/non-repudiation)
-Message to be encrypted using receiverâs public key (to ensure confidentiality)
(5)In any given scenario, when objective is to ensure âconfidentiality & authentication & integrityâ, following treatment is required:
-Message to be encrypted using receiverâs public key (to ensure confidentiality)
-Hash of the message to be encrypted using senderâs private key (to ensure authentication/non-repudiation and integrity)
(1)In any given scenario, when objective is to ensure âconfidentialityâ, message has to be encrypted using receiverâs public key.
(2)In any given scenario, when objective is to ensure âauthenticationâ, HASH of the message has to be created and HASH to be encrypted using senderâs private key. Please note that hash is also known as message digest.
(3)In any given scenario, when objective is to ensure âintegrityâ, HASH of the message has to be created and HASH to be encrypted using senderâs private key. Please note that hash is also known as message digest.
(4)In any given scenario, when objective is to ensure âconfidentiality & authenticationâ, following treatment is required:
-Hash of the message to be encrypted using senderâs private key (to ensure authentication/non-repudiation)
-Message to be encrypted using receiverâs public key (to ensure confidentiality)
(5)In any given scenario, when objective is to ensure âconfidentiality & authentication & integrityâ, following treatment is required:
-Message to be encrypted using receiverâs public key (to ensure confidentiality)
-Hash of the message to be encrypted using senderâs private key (to ensure authentication/non-repudiation and integrity)
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
31.3K
Likes
319
Duration
17:33
Published
Nov 5, 2016
User Reviews
4.4
(6) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now