Tag: symmetric

Symmetric Encryption Ciphers – CompTIA Security+ SY0-401: 6.2

Symmetric Encryption Ciphers – CompTIA Security+ SY0-401: 6.2

| September 23, 2014 | 0 Comments

The speed of symmetric encryption makes it a good choice for our high-speed networks. In this video, you’ll learn about RC4, DES, 3DES, AES, Blowfish, and Twofish.

Continue Reading

Key Escrow – CompTIA Security+ SY0-401: 6.1

Key Escrow – CompTIA Security+ SY0-401: 6.1

| September 21, 2014 | 0 Comments

In large environments, your encryption keys may be held by a third-party to ensure that the encrypted data can always be recovered. In this video, you’ll learn about key escrow and some of the business cases where key escrow should be used.

Continue Reading

Block vs. Stream Ciphers – CompTIA Security+ SY0-401: 6.1

Block vs. Stream Ciphers – CompTIA Security+ SY0-401: 6.1

| September 21, 2014 | 0 Comments

Some data transfer methods will encrypt data one byte at a time or in groups of larger data blocks. In this video, you’ll learn how block ciphers combine data encryption with speed and efficiency.

Continue Reading

Session Keys – CompTIA Security+ SY0-401: 6.1

Session Keys – CompTIA Security+ SY0-401: 6.1

| September 21, 2014 | 0 Comments

To provide a secure channel, both sides of the conversation need to share the keys that will be used during the session. In this video, you’ll learn about session keys and the different methods used to provide a secure exchange of session keys.

Continue Reading

Public Keys and Private Keys – CompTIA Security+ SY0-401: 6.1

Public Keys and Private Keys – CompTIA Security+ SY0-401: 6.1

| September 21, 2014 | 0 Comments

Asymmetric encryption uses two different keys to provide a secure channel. In this video, you’ll learn how public keys and private keys can be used to encrypt data, create digital signatures, and create a secure symmetric key.

Continue Reading

Symmetric vs. Asymmetric Encryption – CompTIA Security+ SY0-401: 6.1

Symmetric vs. Asymmetric Encryption – CompTIA Security+ SY0-401: 6.1

| September 21, 2014 | 0 Comments

Our encryption methods will generally use either symmetric encryption or asymmetric encryption, and sometimes both! In this video, you’ll learn the advantages and disadvantages when using symmetric or asymmetric encryption types.

Continue Reading

X