We use a number of algorithms to maintain the security of our data as it flows across the network. In this video, you’ll learn about SSL, SSH, and IPsec encryption protocols.
Asymmetric cryptography has enabled secure communication, digital signatures, and much more. In this video, you’ll learn about the well-known asymmetric algorithms of RSA and Diffie-Hellman.
The speed of symmetric encryption makes it a good choice for our high-speed networks. In this video, you’ll learn about RC4, DES, 3DES, AES, Blowfish, and Twofish.
There are many hash functions for many different circumstances. In this video, you’ll learn about MD5, SHA, RIPEMD, and HMAC hash functions.
When a web server uses a single private key to encrypt all communication, then all communication can potentially be decrypted afterwards with this single bit of data. In this video, you’ll learn how perfect forward secrecy can be used to create encryption keys dynamically for every encrypted session.
The creation and use of cryptography has also included new ways to keep our data private. In this video, you’ll learn about the use of elliptic curves to create encryption keys and how quantum cryptography can be used for spy-proof secure channels.