Cryptography Essentials: Hashing, Encryption & Quantum Risks π | BCIS 4345 Episode 3
Dive into Episode 3 of the BCIS 4345 podcast as Dr. Joseph H. Schuessler explores the fundamentals of cryptography, including hashing, encryption techniques, and the emerging quantum threats to data security.

Joseph H.Schuessler
43 views β’ Aug 22, 2025

About this video
π Welcome to Episode 3 of the BCIS 4345: Network and System Security Podcast, hosted by Dr. Joseph H. Schuessler from the Dr. Sam Pack College of Business at Tarleton State University.
In this episode, we explore the fundamentals of cryptographyβthe science of securing data through algorithms and keys. From hashing and symmetric/asymmetric encryption to blockchain applications and the emerging challenges of quantum computing, this discussion highlights how cryptography is both a powerful defense and a system with limitations attackers seek to exploit.
Based on the text:
Ciampa, M. (2025). CompTIA Security+ Guide to Network Security Fundamentals (8th ed.). Cengage. https://www.cengage.com/c/new-edition/9798214000787/
π Created with NotebookLM, Googleβs AI-powered research assistant that integrates your course content into a connected learning experience.
π Explore the interactive notebook:
NotebookLM Companion https://notebooklm.google.com/notebook/2401923e-53f0-4d8e-a893-1e0732bed9ee?artifactId=2bad09d5-fe9d-45e9-811d-0576e639c3d0
π For questions regarding this course, please reach out to Dr. Schuessler's Teaching Assistant:
https://chatgpt.com/g/g-68a8751d22788191a9e0733bd9f44bf9-bcis-4345-network-and-systems-security
π Key Topics Covered:
π Defining Cryptography β Hiding messages vs. hiding meaning (steganography vs. encryption)
π Cryptographic Algorithms β Hashing, symmetric (AES, 3DES, RC, Blowfish, Twofish), asymmetric (RSA, ECC, DSA)
πΎ Software & Hardware Encryption β File system encryption, BitLocker, self-encrypting drives, HSMs, TPMs, and TEEs
π Blockchain Security β Immutable ledgers and SHA-256 in distributed trust
β οΈ Cryptographic Limitations & Attacks β Key length, weak keys, algorithm attacks, collisions, birthday attacks
βοΈ Quantum Computing Threats β Quantum cryptography, quantum communication, and post-quantum defenses
π CompTIA Security+ Alignment β Core cryptography knowledge for IT, MIS, and CIS majors entering cybersecurity careers
πΊ Watch the Full BCIS 4345 Series:
BCIS 4345 Playlist https://www.youtube.com/playlist?list=PLRU5YMNncPaot28FOZlxoDIDuluj45y9g
π Explore More BCIS Podcasts You May Like:
β’ https://www.youtube.com/playlist?list=PLRU5YMNncPaqUbrPJXlS1t1YIOOIbwwCm
β’ https://www.youtube.com/playlist?list=PLRU5YMNncPaob4xqmqrx5_VyvYvfc54xW
β’ https://www.youtube.com/playlist?list=PLRU5YMNncParSkh1iYUHD4weh4qvpXrwR
β’ https://www.youtube.com/playlist?list=PLRU5YMNncPaqM6860sJUUlL0PCEyggK_K
β’ https://www.youtube.com/playlist?list=PLRU5YMNncPapL3JvXOaiVNckBY3-0JNQS
β’ https://www.youtube.com/playlist?list=PLRU5YMNncPaoOozvXkDTSY1iqjsC42n4u
β’ https://www.youtube.com/playlist?list=PLRU5YMNncPaqN14zaj_InWi8R8w9qhjTt
π If this episode helped you understand the foundations of cryptography and its role in cybersecurity, like, subscribe, and share with classmates.
π Turn on notifications to follow along with the full series.
π¨οΈ Discussion Prompt: Do you think quantum computing will completely break current encryption methods, or will post-quantum cryptography keep us secure? Why?
In this episode, we explore the fundamentals of cryptographyβthe science of securing data through algorithms and keys. From hashing and symmetric/asymmetric encryption to blockchain applications and the emerging challenges of quantum computing, this discussion highlights how cryptography is both a powerful defense and a system with limitations attackers seek to exploit.
Based on the text:
Ciampa, M. (2025). CompTIA Security+ Guide to Network Security Fundamentals (8th ed.). Cengage. https://www.cengage.com/c/new-edition/9798214000787/
π Created with NotebookLM, Googleβs AI-powered research assistant that integrates your course content into a connected learning experience.
π Explore the interactive notebook:
NotebookLM Companion https://notebooklm.google.com/notebook/2401923e-53f0-4d8e-a893-1e0732bed9ee?artifactId=2bad09d5-fe9d-45e9-811d-0576e639c3d0
π For questions regarding this course, please reach out to Dr. Schuessler's Teaching Assistant:
https://chatgpt.com/g/g-68a8751d22788191a9e0733bd9f44bf9-bcis-4345-network-and-systems-security
π Key Topics Covered:
π Defining Cryptography β Hiding messages vs. hiding meaning (steganography vs. encryption)
π Cryptographic Algorithms β Hashing, symmetric (AES, 3DES, RC, Blowfish, Twofish), asymmetric (RSA, ECC, DSA)
πΎ Software & Hardware Encryption β File system encryption, BitLocker, self-encrypting drives, HSMs, TPMs, and TEEs
π Blockchain Security β Immutable ledgers and SHA-256 in distributed trust
β οΈ Cryptographic Limitations & Attacks β Key length, weak keys, algorithm attacks, collisions, birthday attacks
βοΈ Quantum Computing Threats β Quantum cryptography, quantum communication, and post-quantum defenses
π CompTIA Security+ Alignment β Core cryptography knowledge for IT, MIS, and CIS majors entering cybersecurity careers
πΊ Watch the Full BCIS 4345 Series:
BCIS 4345 Playlist https://www.youtube.com/playlist?list=PLRU5YMNncPaot28FOZlxoDIDuluj45y9g
π Explore More BCIS Podcasts You May Like:
β’ https://www.youtube.com/playlist?list=PLRU5YMNncPaqUbrPJXlS1t1YIOOIbwwCm
β’ https://www.youtube.com/playlist?list=PLRU5YMNncPaob4xqmqrx5_VyvYvfc54xW
β’ https://www.youtube.com/playlist?list=PLRU5YMNncParSkh1iYUHD4weh4qvpXrwR
β’ https://www.youtube.com/playlist?list=PLRU5YMNncPaqM6860sJUUlL0PCEyggK_K
β’ https://www.youtube.com/playlist?list=PLRU5YMNncPapL3JvXOaiVNckBY3-0JNQS
β’ https://www.youtube.com/playlist?list=PLRU5YMNncPaoOozvXkDTSY1iqjsC42n4u
β’ https://www.youtube.com/playlist?list=PLRU5YMNncPaqN14zaj_InWi8R8w9qhjTt
π If this episode helped you understand the foundations of cryptography and its role in cybersecurity, like, subscribe, and share with classmates.
π Turn on notifications to follow along with the full series.
π¨οΈ Discussion Prompt: Do you think quantum computing will completely break current encryption methods, or will post-quantum cryptography keep us secure? Why?
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
43
Likes
1
Duration
55:39
Published
Aug 22, 2025
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.