Cryptography Use Cases – CompTIA Security+ SY0-501 – 6.1

We use cryptography for many different purposes. In this video, you’ll learn about some of the most common cryptography use cases. << Previous Video: Perfect Forward Secrecy Next: Symmetric Algorithms >>   One of the challenges we have with today’s mobile devices is we’re limited by the amount of battery that we currently have available. […]

Cryptography Use Cases – CompTIA Security+ SY0-501 – 6.1 Read More »

Perfect Forward Secrecy – CompTIA Security+ SY0-501 – 6.1

Traditional web server encryption has relied on a single private key to provide confidentiality. In this video, you’ll learn about the alternative of perfect forward secrecy. << Previous Video: States of Data Next: Common Cryptography Use Cases >>   When our browser is communicating to a web server over an encrypted channel it’s using SSL,

Perfect Forward Secrecy – CompTIA Security+ SY0-501 – 6.1 Read More »

Stream and Block Ciphers – CompTIA Security+ SY0-501 – 6.1

It’s common to use encryption methods that best suit the task at hand. In this video, you’ll learn about the differences between stream ciphers and block ciphers. << Previous Video: Steganography Next: States of Data >> We communicate across the network in different ways. And because of this, we use different types of encryption, depending

Stream and Block Ciphers – CompTIA Security+ SY0-501 – 6.1 Read More »

Cryptographic Keys – CompTIA Security+ SY0-501 – 6.1

The keys used in cryptography may consist of many different characteristics. In this video, you’ll learn about key strength, the key exchange process, and real-time encryption and decryption. << Previous Video: Weak Encryption Next: Steganography >> Cryptography doesn’t rely on security through obscurity. With cryptography, you know practically everything about the cryptographic process. The entire

Cryptographic Keys – CompTIA Security+ SY0-501 – 6.1 Read More »

Weak Encryption – CompTIA Security+ SY0-501 – 6.1

Not all encryption is equally secure. In this video, you’ll learn what makes an encryption method strong or weak. << Previous Video: Randomizing Cryptography Next: Cryptographic Keys >> When you start comparing different kinds of cryptography, you’ll find that some we refer to as strong cryptography, and others might be considered weak cryptography. We make

Weak Encryption – CompTIA Security+ SY0-501 – 6.1 Read More »

Randomizing Cryptography – CompTIA Security+ SY0-501 – 6.1

We rely heavily on randomization when using cryptography. In this video, you’ll learn about the importance of randomization and how random information is used to provide data security. << Previous Video: Hashing and Digital Signatures Next: Weak Encryption >> In an earlier video, I talked about encryption relying on randomisation. And here’s a good example.

Randomizing Cryptography – CompTIA Security+ SY0-501 – 6.1 Read More »

Hashing and Digital Signatures – CompTIA Security+ SY0-501 – 6.1

A cryptographic hash can be used for many different tasks. In this video, you’ll learn about hashing, collisions, digital signatures, and more. << Previous Video: Symmetric and Asymmetric Encryption Next: Randomizing Cryptography >> A cryptographic hash allows you to take any amount of data– it can be a small bit of text, or it can

Hashing and Digital Signatures – CompTIA Security+ SY0-501 – 6.1 Read More »