One-Time Pads – CompTIA Security+ SY0-401: 6.2
Encrypting with a one-time pad is a very strong encryption technique. In this video, I’ll demonstrate how you can use a one-time pad to encrypt your data.
Encrypting with a one-time pad is a very strong encryption technique. In this video, I’ll demonstrate how you can use a one-time pad to encrypt your data.
Asymmetric cryptography has enabled secure communication, digital signatures, and much more. In this video, you’ll learn about the well-known asymmetric algorithms of RSA and Diffie-Hellman.
Asymmetric Cryptography Algorithms – CompTIA Security+ SY0-401: 6.2 Read More »
The speed of symmetric encryption makes it a good choice for our high-speed networks. In this video, you’ll learn about RC4, DES, 3DES, AES, Blowfish, and Twofish.
Symmetric Encryption Ciphers – CompTIA Security+ SY0-401: 6.2 Read More »
There are many hash functions for many different circumstances. In this video, you’ll learn about MD5, SHA, RIPEMD, and HMAC hash functions.
Cryptographic Hash Functions – CompTIA Security+ SY0-401: 6.2 Read More »
802.11 networks rely on encryption to ensure the security of all wireless traffic. In this video, you’ll learn about WEP and WPA encryption and the dangers of using the wrong encryption on your wireless network.
This month, there’s more live Q&A and I answer your questions in the after-show. The A+ Study Group After-Show
Professor Messer’s CompTIA A+ Study Group – September 2014 Read More »
When a web server uses a single private key to encrypt all communication, then all communication can potentially be decrypted afterwards with this single bit of data. In this video, you’ll learn how perfect forward secrecy can be used to create encryption keys dynamically for every encrypted session.
Perfect Forward Secrecy – CompTIA Security+ SY0-401: 6.1 Read More »
The creation and use of cryptography has also included new ways to keep our data private. In this video, you’ll learn about the use of elliptic curves to create encryption keys and how quantum cryptography can be used for spy-proof secure channels.
Elliptic Curve and Quantum Cryptography – CompTIA Security+ SY0-401: 6.1 Read More »
When sending encrypted data, is usually very clear that the information transfer has been obfuscated. In this video, you’ll learn how steganography can be used to send information through covert, and sometimes unexpected, channels.