Not all encryption algorithms are alike, and some are much better than others. In this video, you’ll learn how to evaluate encryption strength and how developers can use the bcrypt library to generate secure hashes.
We use a number of algorithms to maintain the security of our data as it flows across the network. In this video, you’ll learn about SSL, SSH, and IPsec encryption protocols.
NTLM has been used to encrypt user authentication details in the Microsoft operating systems. In this video, you’ll learn about the history of NTLM and how the password information was stored in Windows.
Encrypting with a one-time pad is a very strong encryption technique. In this video, I’ll demonstrate how you can use a one-time pad to encrypt your data.
Asymmetric cryptography has enabled secure communication, digital signatures, and much more. In this video, you’ll learn about the well-known asymmetric algorithms of RSA and Diffie-Hellman.
The speed of symmetric encryption makes it a good choice for our high-speed networks. In this video, you’ll learn about RC4, DES, 3DES, AES, Blowfish, and Twofish.
There are many hash functions for many different circumstances. In this video, you’ll learn about MD5, SHA, RIPEMD, and HMAC hash functions.
802.11 networks rely on encryption to ensure the security of all wireless traffic. In this video, you’ll learn about WEP and WPA encryption and the dangers of using the wrong encryption on your wireless network.
When a web server uses a single private key to encrypt all communication, then all communication can potentially be decrypted afterwards with this single bit of data. In this video, you’ll learn how perfect forward secrecy can be used to create encryption keys dynamically for every encrypted session.
The creation and use of cryptography has also included new ways to keep our data private. In this video, you’ll learn about the use of elliptic curves to create encryption keys and how quantum cryptography can be used for spy-proof secure channels.