Modes of Operation & Algorithms

Beginner
  • 18 videos | 1h 1m 27s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 16 users Rating 4.5 of 16 users (16)
Cryptography is far more than just selecting an algorithm and calling the encrypt or decrypt method. Explore the modes of operation for encryption algorithms as well as when particular algorithms are best suited to the data being protected.

WHAT YOU WILL LEARN

  • Describe and identify data that has been encrypted using the ecb mode
    Specify how cipher block chaining uses an iv, or initialization vector, to make data appear random
    Describe how propagating cipher block chaining mode improved on cbc by causing small changes to each block encrypted
    Describe the cipher feedback mode and how it builds on cbc and makes a block cipher into a stream cipher
    Describe the output feedback mode and how it can use the same process for encryption and decryption
    Describe the counter mode and how it can be used for parallelizing encryption and decryption
    Use a simple aes implementation to encrypt and decrypt data and compare the results to the nist standard to confirm operation of the algorithm
    Describe how the des and 3des algorithms work to encrypt and decrypt data
    Describe the blowfish block cipher algorithm and its properties
  • Describe the rc4 streaming cipher and its properties
    Describe the elgamal cipher algorithm and its usage
    Describe the rsa public-key encryption and its operation
    Describe the deprecated md5 and sha1 algorithms and the newly chosen replacement, sha3
    Apply and describe the operation of the sha2 hashing algorithms
    Describe the hash message authentication code, or hmac, and its use to authenticate and verify the integrity of a message
    Identify and describe basic key management policies and procedures
    Describe how to cryptographically exchange keys securely
    Identify the role and purpose of key escrow policies and procedures

IN THIS COURSE

  • 2m 50s
  • 3m 45s
  • Locked
    3.  Using Propagating Cipher Block Chaining (PCBC)
    3m 29s
  • Locked
    4.  Using Cipher Feedback (CFB)
    3m 46s
  • Locked
    5.  Using Output Feedback (OFB)
    3m 2s
  • Locked
    6.  Describing Counter (CTR)
    3m 8s
  • Locked
    7.  Using the AES Block Algorithm
    3m 28s
  • Locked
    8.  Applying the DES/3DES Block Algorithm
    3m 8s
  • Locked
    9.  Describing the Blowfish Block Algorithm
    3m 27s
  • Locked
    10.  Describing the RC4 Streaming Algorithm
    3m 18s
  • Locked
    11.  Describing the ElGamal Algorithm
    2m 43s
  • Locked
    12.  Defining the RSA Algorithm
    3m 12s
  • Locked
    13.  Describing MD5, SHA1, and SHA3
    4m 28s
  • Locked
    14.  Using SHA2
    2m 29s
  • Locked
    15.  Describing HMAC
    2m 33s
  • Locked
    16.  Describing Key Management
    6m 34s
  • Locked
    17.  Describing Key Exchange
    3m 18s
  • Locked
    18.  Describing Key Escrow
    2m 50s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Channel Ethical Hacking
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 237 users Rating 4.5 of 237 users (237)
Rating 4.6 of 71 users Rating 4.6 of 71 users (71)
Rating 4.4 of 116 users Rating 4.4 of 116 users (116)