From the course: ISACA Certified Information System Manager (CISM) Cert Prep
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Symmetric cryptography
From the course: ISACA Certified Information System Manager (CISM) Cert Prep
Symmetric cryptography
- [Instructor] Alright, so symmetric cryptography. This is what all of our historical types of cryptography or you know, the Caesar cipher and the enigma machine, they were all symmetric. We really didn't have an asymmetric algorithm until the late seventies, two gentlemen, Whitfield Diffie and Martin Hellman, came out with the Diffie-Hellman algorithm, which was our first asymmetric. So everything historical is going to fall in the category of being symmetric. Now, symmetric cryptography, remember, we have one key shared between two parties. I'm going to use that key to encrypt. You're going to to use the key to decrypt. Now the tricky part is, we have to share that key between us, alright? Now remember we referred to that as being out-of-band key exchange. And our encryption is only as strong as our key exchanges. So if we have weak key exchange, we have weak encryption, right? Because anybody could intercept that key. So we have to find a good, secure way for me to get the secret…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
Information security program concepts7m 38s
-
(Locked)
Elements of an information security program9m 59s
-
(Locked)
Business case and budget12m 18s
-
(Locked)
Asset identification and classification12m 39s
-
(Locked)
Management controls19m 11s
-
(Locked)
Operational controls, part 115m 28s
-
(Locked)
Operational controls, part 219m 11s
-
(Locked)
Technical controls1m 42s
-
(Locked)
Symmetric cryptography6m 29s
-
(Locked)
Asymmetric cryptography7m 33s
-
(Locked)
Integrity and non-repudiation13m 15s
-
(Locked)
Data security and endpoint protection6m 50s
-
(Locked)
Network protection: segmentation12m 46s
-
(Locked)
Network address translation5m 30s
-
(Locked)
Wireless networks7m 13s
-
(Locked)
Network services10m 37s
-
(Locked)
Cloud integration13m 44s
-
-
-