From the course: ISACA Certified Information System Manager (CISM) Cert Prep

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Symmetric cryptography

Symmetric cryptography

- [Instructor] Alright, so symmetric cryptography. This is what all of our historical types of cryptography or you know, the Caesar cipher and the enigma machine, they were all symmetric. We really didn't have an asymmetric algorithm until the late seventies, two gentlemen, Whitfield Diffie and Martin Hellman, came out with the Diffie-Hellman algorithm, which was our first asymmetric. So everything historical is going to fall in the category of being symmetric. Now, symmetric cryptography, remember, we have one key shared between two parties. I'm going to use that key to encrypt. You're going to to use the key to decrypt. Now the tricky part is, we have to share that key between us, alright? Now remember we referred to that as being out-of-band key exchange. And our encryption is only as strong as our key exchanges. So if we have weak key exchange, we have weak encryption, right? Because anybody could intercept that key. So we have to find a good, secure way for me to get the secret…

Contents