Cryptography Essentials: Encryption, Hashing & Real-World Applications π
Discover the fundamentals of cryptography, including encryption and hashing, and learn how these techniques are applied to protect information in today's digital world.

Linh Nguyen
48 views β’ Nov 22, 2019

About this video
Cryptography: ENCRYPTION, HASHING AND ITS APPLICATIONS
The video acts as a simple explanation for various techniques in the
field of Information Technology. The video did not use a lot of
specialized words but instead, use simple and easy-to-understand
words. The goal is to make it easier for non-technical people to
understand. Definitions and explanations are visualized by image and
color so that it might be more interesting to watch.
RESOURCE AND REFERENCES:
Video made with: Adobe Spark [Available online: https://spark.adobe.com/]
Icon resource: Flaticon [Available online: https://www.flaticon.com/]
Image Editor: Canva [Available online: https://www.canva.com/]
Hendrickson, J. (2019). Why Are Companies Still Storing Passwords In Plain Text?. [online] How-To Geek. Available at: https://www.howtogeek.com/434930/why-are-companies-still-storing-passwords-in-plain-text/ [Accessed 15 Nov. 2019].
Jscrambler. (2016). Hashing Algorithms. [online] Available at: https://blog.jscrambler.com/hashing-algorithms/ [Accessed 17 Nov. 2019].
SSL2BUY Wiki. (2019). Symmetric vs. Asymmetric Encryption β What are differences?. [online] Available at: https://www.ssl2buy.com/wiki/symmetric-vs-asymmetric-encryption-what-are-differences [Accessed 17 Nov. 2019].
The video acts as a simple explanation for various techniques in the
field of Information Technology. The video did not use a lot of
specialized words but instead, use simple and easy-to-understand
words. The goal is to make it easier for non-technical people to
understand. Definitions and explanations are visualized by image and
color so that it might be more interesting to watch.
RESOURCE AND REFERENCES:
Video made with: Adobe Spark [Available online: https://spark.adobe.com/]
Icon resource: Flaticon [Available online: https://www.flaticon.com/]
Image Editor: Canva [Available online: https://www.canva.com/]
Hendrickson, J. (2019). Why Are Companies Still Storing Passwords In Plain Text?. [online] How-To Geek. Available at: https://www.howtogeek.com/434930/why-are-companies-still-storing-passwords-in-plain-text/ [Accessed 15 Nov. 2019].
Jscrambler. (2016). Hashing Algorithms. [online] Available at: https://blog.jscrambler.com/hashing-algorithms/ [Accessed 17 Nov. 2019].
SSL2BUY Wiki. (2019). Symmetric vs. Asymmetric Encryption β What are differences?. [online] Available at: https://www.ssl2buy.com/wiki/symmetric-vs-asymmetric-encryption-what-are-differences [Accessed 17 Nov. 2019].
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
48
Likes
6
Duration
8:11
Published
Nov 22, 2019
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now