Cryptography Essentials: Hashing, Encryption & Quantum Risks πŸ” | BCIS 4345 Episode 3

Dive into Episode 3 of the BCIS 4345 podcast as Dr. Joseph H. Schuessler explores the fundamentals of cryptography, including hashing, encryption techniques, and the emerging quantum threats to data security.

Cryptography Essentials: Hashing, Encryption & Quantum Risks πŸ” | BCIS 4345 Episode 3
Joseph H.Schuessler
43 views β€’ Aug 22, 2025
Cryptography Essentials: Hashing, Encryption & Quantum Risks πŸ” | BCIS 4345 Episode 3

About this video

πŸŽ™ Welcome to Episode 3 of the BCIS 4345: Network and System Security Podcast, hosted by Dr. Joseph H. Schuessler from the Dr. Sam Pack College of Business at Tarleton State University.

In this episode, we explore the fundamentals of cryptographyβ€”the science of securing data through algorithms and keys. From hashing and symmetric/asymmetric encryption to blockchain applications and the emerging challenges of quantum computing, this discussion highlights how cryptography is both a powerful defense and a system with limitations attackers seek to exploit.

Based on the text:
Ciampa, M. (2025). CompTIA Security+ Guide to Network Security Fundamentals (8th ed.). Cengage. https://www.cengage.com/c/new-edition/9798214000787/

πŸ“˜ Created with NotebookLM, Google’s AI-powered research assistant that integrates your course content into a connected learning experience.
πŸ”— Explore the interactive notebook:
NotebookLM Companion https://notebooklm.google.com/notebook/2401923e-53f0-4d8e-a893-1e0732bed9ee?artifactId=2bad09d5-fe9d-45e9-811d-0576e639c3d0

πŸ”— For questions regarding this course, please reach out to Dr. Schuessler's Teaching Assistant:
https://chatgpt.com/g/g-68a8751d22788191a9e0733bd9f44bf9-bcis-4345-network-and-systems-security

πŸ” Key Topics Covered:
πŸ” Defining Cryptography – Hiding messages vs. hiding meaning (steganography vs. encryption)
πŸ”‘ Cryptographic Algorithms – Hashing, symmetric (AES, 3DES, RC, Blowfish, Twofish), asymmetric (RSA, ECC, DSA)
πŸ’Ύ Software & Hardware Encryption – File system encryption, BitLocker, self-encrypting drives, HSMs, TPMs, and TEEs
πŸ“Š Blockchain Security – Immutable ledgers and SHA-256 in distributed trust
⚠️ Cryptographic Limitations & Attacks – Key length, weak keys, algorithm attacks, collisions, birthday attacks
βš›οΈ Quantum Computing Threats – Quantum cryptography, quantum communication, and post-quantum defenses
πŸŽ“ CompTIA Security+ Alignment – Core cryptography knowledge for IT, MIS, and CIS majors entering cybersecurity careers

πŸ“Ί Watch the Full BCIS 4345 Series:
BCIS 4345 Playlist https://www.youtube.com/playlist?list=PLRU5YMNncPaot28FOZlxoDIDuluj45y9g

πŸ”— Explore More BCIS Podcasts You May Like:
β€’ https://www.youtube.com/playlist?list=PLRU5YMNncPaqUbrPJXlS1t1YIOOIbwwCm
β€’ https://www.youtube.com/playlist?list=PLRU5YMNncPaob4xqmqrx5_VyvYvfc54xW
β€’ https://www.youtube.com/playlist?list=PLRU5YMNncParSkh1iYUHD4weh4qvpXrwR
β€’ https://www.youtube.com/playlist?list=PLRU5YMNncPaqM6860sJUUlL0PCEyggK_K
β€’ https://www.youtube.com/playlist?list=PLRU5YMNncPapL3JvXOaiVNckBY3-0JNQS
β€’ https://www.youtube.com/playlist?list=PLRU5YMNncPaoOozvXkDTSY1iqjsC42n4u
β€’ https://www.youtube.com/playlist?list=PLRU5YMNncPaqN14zaj_InWi8R8w9qhjTt

πŸ‘ If this episode helped you understand the foundations of cryptography and its role in cybersecurity, like, subscribe, and share with classmates.
πŸ›Ž Turn on notifications to follow along with the full series.

πŸ—¨οΈ Discussion Prompt: Do you think quantum computing will completely break current encryption methods, or will post-quantum cryptography keep us secure? Why?

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

43

Likes

1

Duration

55:39

Published

Aug 22, 2025

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.