How to Implement Public Key Infrastructure (PKI) Solutions and Cryptography

CBT Nuggets trainer Bob Salmans covers encryption. Bob uses visuals to explain what encryption is, how itโ€™s done with private and public key pairs, and what ...

How to Implement Public Key Infrastructure (PKI) Solutions and Cryptography
CBT Nuggets
2.7K views โ€ข Dec 8, 2022
How to Implement Public Key Infrastructure (PKI) Solutions and Cryptography

About this video

CBT Nuggets trainer Bob Salmans covers encryption. Bob uses visuals to explain what encryption is, how itโ€™s done with private and public key pairs, and what the Public Key Infrastructure has to do with it. If youโ€™ve got questions about symmetric or asymmetric encryption methods, this video helps clarify the process.

Encryption is converting plain text into unreadable data called cipher text. Encryption protects data against unauthorized viewing (referred to as Confidentiality in the C-I-A triad). Encryption also protects data against unauthorized manipulation or alteration (also referred to as Integrity in the CIA triad).

Symmetric encryption is one of the two types of encryption schemes. Symmetric encryption uses the same key (called a โ€œsecret keyโ€) to encrypt and decrypt the data. Examples of this are 3DES and AES. Asymmetric encryption is the other major type of encryption, it uses two different keys. In asymmetric encryption, one key encrypts, and the other decrypts. It also relies on a public key which is shared, and a private key which must be kept secure and not shared. The keys are stored and distributed by the Public Key Infrastructure (PKI). Examples of asymmetric encryption are RSA, ECC and Diffie Hellman.

The most important part of PKI and asymmetric encryption is the pairing of the private key with the public key. When encrypting messages via PKI, the sender uses the public key to encrypt the message and the private key is used to decrypt the message. Itโ€™s also possible to encrypt a message with the private key and have the public key decrypt it.

0:00 โ€“ Introduction how to implement PKI solutions and cryptography
0:20 โ€“ The definition of encryption and its use in cryptography
1:25 โ€“ Symmetric encryption is one of the two major types of encryption schemes
3:10 โ€“ How asymmetric encryption differs from symmetric encryption
5:05 โ€“ Using a public key and a private key pair to encrypt and decrypt messages

Watch this entire course: https://training.cbt.gg/d0t

Not a CBT Nuggets subscriber? Start your free week: https://www.cbtnuggets.com/signup

Apply to become a CBT Nuggets trainer! https://www.cbtnuggets.com/become-a-trainer
-----------------
Connect with CBT Nuggets for the latest in IT training:
โ€ข Twitter - https://twitter.com/CBTNuggets
โ€ข Facebook - http://facebook.com/CBTNuggets
โ€ข Instagram - http://instagram.com/CBTNuggets
โ€ข LinkedIn - https://www.linkedin.com/company/cbt-nuggets

#encryption #pki #cryptography #ittraining #cbtnuggets

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

2.7K

Likes

49

Duration

7:16

Published

Dec 8, 2022

User Reviews

4.5
(2)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.