Public and Private Keys – CompTIA Security+ SY0-401: 6.3
For asymmetric encryption, you’ll need the public and private key pair for successful encryption and decryption. In this video, I’ll demonstrate the creation of a public and private key pair.
For asymmetric encryption, you’ll need the public and private key pair for successful encryption and decryption. In this video, I’ll demonstrate the creation of a public and private key pair.
If you lose your encryption key, you’ll lose access to all of your data. In this video, you’ll learn about key recovery techniques and how some certificate authorities can manage your encryption keys.
If you have a large number of devices using a public key infrastructure, you’ll need a way to manage all of the keys in the infrastructure. In this video, you’ll learn about public key infrastructures and the key management lifecycle.
We rely on digital certificates for much of the encryption that we use over the Internet. In this video, you’ll learn about digital certificates and what information is contained in a digital certificate.
An encryption key may need to be revoked for many reasons. In this video, you’ll learn about automated key revocation and how to revoke keys in a web-of-trust.
Our browser encryption relies on certificate authorities to maintain the trust of your certificates. In this video, you’ll learn how certificate authorities are used on our computers and the differences between a commercial CA and a private CA.
Not all encryption algorithms are alike, and some are much better than others. In this video, you’ll learn how to evaluate encryption strength and how developers can use the bcrypt library to generate secure hashes.
We use a number of algorithms to maintain the security of our data as it flows across the network. In this video, you’ll learn about SSL, SSH, and IPsec encryption protocols.
NTLM has been used to encrypt user authentication details in the Microsoft operating systems. In this video, you’ll learn about the history of NTLM and how the password information was stored in Windows.
Encrypting with a one-time pad is a very strong encryption technique. In this video, I’ll demonstrate how you can use a one-time pad to encrypt your data.