Algorithms and Keys

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
7 hours 50 minutes
Difficulty
Beginner
CEU/CPE
8
Video Transcription
00:00
>> We're going to continue to build on this idea that
00:00
>> if we take plain texts and an initialization vector,
00:00
>> and an algorithm, and a key,
00:00
we will somehow magically create ciphertext.
00:00
We already talked about are
00:00
>> what our initialization vector is.
00:00
>> It's going to add randomness to the process.
00:00
The next thing I want to talk about is an algorithm.
00:00
Now if you see this screen,
00:00
you can see that we've got a series of math functions.
00:00
Base on my 12 years of
00:00
North Carolina Public School math.
00:00
The functions you see,
00:00
>> are the only math functions I can perform.
00:00
>> Now, I can take any number and add 2,
00:00
subtract 2, multiply or divide by 2.
00:00
I can raise the power of 2,
00:00
take the square root of 2, but that's it.
00:00
I can't do any other math.
00:00
This is my algorithm.
00:00
An algorithm is just the collection of
00:00
math functions that can be performed.
00:00
We have to remember that
00:00
>> no matter how complex your message,
00:00
>> your image, or your data is,
00:00
it all comes down to numbers.
00:00
It's just a series of zeros and ones.
00:00
Some algorithms will take that data and
00:00
chunk it into blocks of certain sizes.
00:00
Somebody chunk it into 128-bit blocks.
00:00
Each block goes through a series of math functions.
00:00
With each math function, substitution happens.
00:00
For example, when it goes through function 3,
00:00
it gets to multiplied by 2,
00:00
and the result of that is
00:00
substituted for what you originally had.
00:00
Each of these functions is where
00:00
the actual substitution of cryptography happens.
00:00
For that reason, sometimes
00:00
instead of refrained to algorithms as functions,
00:00
you'll hear them referred to as
00:00
S boxes for substitution boxes.
00:00
But this is where the actual substitution
00:00
happens in the algorithm.
00:00
Now the problem is, I don't know
00:00
how many functions we should
00:00
use or the order we should use them.
00:00
That is where our friend, the key comes in.
00:00
A key is going to determine
00:00
which functions are used and in what order,
00:00
and how many overall math functions will be used.
00:00
The key contains the instructions on how to use math.
00:00
An algorithm and a key have to go together.
00:00
Now, an initialization vector is not mandatory,
00:00
but it is very helpful.
00:00
A lot of times when we talk about how to encrypt,
00:00
we do include the IV, algorithm, and key.
00:00
But honestly,
00:00
>> if you only had the algorithm and the key,
00:00
>> you still have encryption.
00:00
I will also say for future discussions
00:00
that when I say algorithm,
00:00
I could also just say cipher.
00:00
Those two words are really interchangeable.
00:00
Now, key is much more frequently used term,
00:00
but an alternative to a key would be a cryptovariable.
00:00
But I will probably never say
00:00
that. I will always say key.
Up Next