Cryptographic Methods

Beginner
  • 8 videos | 27m 17s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 43 users Rating 4.7 of 43 users (43)
Cryptography uses different methods to protect data. Explore different methods used to protect or transmit data securely, and some of the components that ensure data can be protected.

WHAT YOU WILL LEARN

  • Describe how opt, or one-time pad, cryptography can theoretically provide perfect secrecy but has some significant limitations
    Describe and use a substitution cipher and understand the weaknesses that can be exploited by an attacker against these ciphers
    Describe and identify the features and use cases for symmetric-key cipher algorithms
    Describe and identify the features and use cases for asymmetric-key cipher algorithms
  • Describe the use of steganography in encryption products to hide the fact data is even encrypted
    Describe the purpose of cryptographic hash functions and how they can be used in cryptography to provide data integrity
    Describe a digital signature and how it can be used for authentication and non-repudiation
    Identify the cryptographic algorithm to use

IN THIS COURSE

  • 3m 47s
    Upon completion of this video, you will be able to describe how OPT, or one-time pad, cryptography can theoretically provide perfect secrecy, but has some significant limitations. FREE ACCESS
  • 4m 8s
    Upon completion of this video, you will be able to describe and use a substitution cipher and understand the weaknesses that can be exploited by an attacker against these ciphers. FREE ACCESS
  • Locked
    3.  Using Symmetric Algorithms
    2m 34s
    Upon completion of this video, you will be able to describe and identify the features and use cases for symmetric key cipher algorithms. FREE ACCESS
  • Locked
    4.  Working with Asymmetric Algorithms
    3m 24s
    Upon completion of this video, you will be able to describe and identify the features and use cases for asymmetric key cipher algorithms. FREE ACCESS
  • Locked
    5.  Hiding Data Using Steganography
    4m 20s
    Upon completion of this video, you will be able to describe the use of steganography in encryption products to hide the fact that data is even encrypted. FREE ACCESS
  • Locked
    6.  Using One-way Hashes
    2m 58s
    After completing this video, you will be able to describe the purpose of cryptographic hash functions and how they can be used in cryptography to provide data integrity. FREE ACCESS
  • Locked
    7.  Describing Digital Signatures
    2m 50s
    Upon completion of this video, you will be able to describe a digital signature and how it can be used for authentication and to prevent denial. FREE ACCESS
  • Locked
    8.  Exercise: Identify the Cryptographic Algorithm used
    3m 17s
    During this video, you will learn how to identify the appropriate cryptographic algorithm to use. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 185 users Rating 4.5 of 185 users (185)
Rating 4.6 of 2013 users Rating 4.6 of 2013 users (2013)
Rating 4.5 of 70 users Rating 4.5 of 70 users (70)