Asymmetric cryptography has enabled secure communication, digital signatures, and much more. In this video, you’ll learn about the well-known asymmetric algorithms of RSA and Diffie-Hellman.
In large environments, your encryption keys may be held by a third-party to ensure that the encrypted data can always be recovered. In this video, you’ll learn about key escrow and some of the business cases where key escrow should be used.
To provide a secure channel, both sides of the conversation need to share the keys that will be used during the session. In this video, you’ll learn about session keys and the different methods used to provide a secure exchange of session keys.
Asymmetric encryption uses two different keys to provide a secure channel. In this video, you’ll learn how public keys and private keys can be used to encrypt data, create digital signatures, and create a secure symmetric key.
Our encryption methods will generally use either symmetric encryption or asymmetric encryption, and sometimes both! In this video, you’ll learn the advantages and disadvantages when using symmetric or asymmetric encryption types.
Certain security environments may require the escrow of cryptographic keys. In this video, you’ll learn about key escrow and how the key escrow process can be implemented.
The two most common encryption methods are symmetric and asymmetric encryption. In this video, you’ll learn the differences and when you might to see these two methods employed to protect your data.