CISA Exam: Key Concepts of Asymmetric Encryption (Domain-5)
Important points for the CISA exam: In scenarios where the objective is to ensure 'confidentiality', messages must be encrypted using the receiver's public key.
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Thailand under the topic 'สภาพอากาศ'.
About this video
Point to remember for CISA exam:
(1)In any given scenario, when objective is to ensure ‘confidentiality’, message has to be encrypted using receiver’s public key.
(2)In any given scenario, when objective is to ensure ‘authentication’, HASH of the message has to be created and HASH to be encrypted using sender’s private key. Please note that hash is also known as message digest.
(3)In any given scenario, when objective is to ensure ‘integrity’, HASH of the message has to be created and HASH to be encrypted using sender’s private key. Please note that hash is also known as message digest.
(4)In any given scenario, when objective is to ensure ‘confidentiality & authentication’, following treatment is required:
-Hash of the message to be encrypted using sender’s private key (to ensure authentication/non-repudiation)
-Message to be encrypted using receiver’s public key (to ensure confidentiality)
(5)In any given scenario, when objective is to ensure ‘confidentiality & authentication & integrity’, following treatment is required:
-Message to be encrypted using receiver’s public key (to ensure confidentiality)
-Hash of the message to be encrypted using sender’s private key (to ensure authentication/non-repudiation and integrity)
Video Information
Views
31.3K
Total views since publication
Likes
319
User likes and reactions
Duration
17:33
Video length
Published
Nov 5, 2016
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#Asymmetric encryption #symetric encryption #public key #private key #difference between symmetric ann asymmetric key
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.