When sending encrypted data, is usually very clear that the information transfer has been obfuscated. In this video, you’ll learn how steganography can be used to send information through covert, and sometimes unexpected, channels.
In large environments, your encryption keys may be held by a third-party to ensure that the encrypted data can always be recovered. In this video, you’ll learn about key escrow and some of the business cases where key escrow should be used.
Hashing functions can provide us with some interesting ways of validating data. In this video, you’ll learn the fundamentals of hashing and I’ll demonstrate how you can validate a downloaded file by calculating a hash.
Our encryption technologies not only provide a secure channel of communication, but they can also prove that the data we’re receiving has not been changed between endpoints. In this video, you’ll learn about non-repudiation and how digital signatures can ensure the integrity and authenticity of our data.
Encrypting files is important, but our network communication also requires additional privacy. In this video, you’ll learn about the cryptographic techniques used to secure our network connections.
Some data transfer methods will encrypt data one byte at a time or in groups of larger data blocks. In this video, you’ll learn how block ciphers combine data encryption with speed and efficiency.
Our modern applications make extensive use of cryptography. In this video, you’ll learn the basics of cryptography and some of the history of ciphers and secrecy.
Which of these security technologies would be the best choice to store and manage a computer’s cryptographic keys?
Our modern privacy requires new methods of encrypting and protecting our data. In this video, you’ll learn how the emerging technologies of elliptic curve and quantum cryptography are changing the face of encryption.