Introduction to IT and Cybersecurity

### Video Transcription

00:01

Hello and welcome back to the side. Berry 2019 Comp. Tia Security Plus Certification Preparation Course.

00:10

We're going to continue our discussion of marginal six, and the topic of discussion will be domain. Six. Photography and p k. I

00:18

Surprising enough, we have a brand new objective, which is 6.1 where we had the compare a contrast. Basic concepts of photography,

00:27

as mentioned earlier. This is a brain you objective. What we have to compare. Contrast basic concepts off cartography. Let's not turn attention towards some sub topics, which encompasses this particular objective

00:40

first. Or we began by highlighting the topic of some metric algorithms.

00:46

Modes of operation

00:49

asymmetric algorithms

00:52

hashing.

00:54

So that's what it's initialization Vector announced.

00:59

Elliptic Curve

01:00

Week and deprecating algorithms,

01:04

Key exchange,

01:07

digital signatures,

01:11

diffusion

01:11

and, lastly, confused.

01:15

The first item margin is a pre assessment quiz, and it reads as follows. What is true of a digital certificate, but not true of a digital signature? Choose all that apply

01:29

in this case. Is it A has a valid starting and inundate

01:34

B proves the authenticity of a message

01:38

see proves the authenticity of a person or system

01:42

or lastly, D

01:44

provides non repudiation

01:49

in this case, if you selected a your absolute correct because Onley a desert if it has a validity period and proves the authenticity of a security principal

02:04

turnout teacher toward the study of photography. From a historical perspective, the first day we won't mention here is that the rules of photography Off Found and Roman and Egyptian civilization,

02:15

the work photography was corn by combining two Greek words crypto, many hidden and graphing, meaning writing

02:23

the Egyptian use encryption to create mystery and amusement,

02:28

and Romans used it to send secret messages. When you encrypt the password, you apply some sort of algorithm, which scrambles it up.

02:37

Encryption has been around, obviously for awful long period of time.

02:42

The art and science of concealing a message to introduce secrecy and information security is recognized as photography.

02:50

Cartographers used to protect your data address data emotion from being compromised or misuse. It assures confidentiality integrity of the data. It provides protection in terms communication. In other words, you're protected communication, aren't visible by others and verify the data has not been altered

03:09

or corrupt. It

03:12

It also provides authentication. Other words verify the identity of the participants so that begs the question. What are some of the benefits of cartography?

03:21

First of all, encryption. Provide security for data at all times.

03:25

Encrypted data maintains integrity

03:29

Encryption protects your privacy,

03:31

encryptions part of compliance. And lastly, encryption protects data across devices,

03:39

so we look at photography. It's a method of storing and transmitting data, informed that only those that is intended for can re in process is considered a science of protected information by encoding it into an unreadable format.

03:58

So let's take a look at the different types of encryption, not two types of encryption, which we're gonna be discussing doing this video. We're gonna take a look at some metric encryption

04:08

and, lastly, asymmetric encryption.

04:12

When you think about symmetric algorithms.

04:15

Also called private key cryptography, it relies on a share its secret encryption key.

04:21

All of the parties participating in the communication possessed a copy up the Sharqi and use it to encrypt and encrypt messages.

04:30

The sender encrypts the message with the shared key

04:34

and the receiver. The Crips. The message with the Sheriff Key Symmetric encryption is very difficult to break when large size keys are used. Its primary used to perform both encryption and Lastly, symmetric encryption uses a single key that needs to be shared among the people who needs to receive the message

04:57

now forced. The most of operation is to that. We need to mention here. First, we're gonna take a look at block cipher versus Scream cipher

05:08

block Cipher, takes a message and breaks into a fixed size of blocks and converts. One block of the message at an instant

05:16

screamed cipher typically encrypts one bite of the message at the moment instead of using blocks.

05:25

Block, cipher and scream cipher are the methods used for converting the plain text into Sigh protects directly, and it belongs to the family up symmetric key Cyprus

05:40

not force symmetric algorithms

05:43

in terms of photography is based on symmetric encryption.

05:47

Same key. Other words.

05:49

We're talking about the private to encrypt, playing text and decrypt the site protects. It's also called a private a secret. Quick photography now force advantages one key to encrypt and decrypt.

06:01

Also, it uses less processing power

06:04

now, in terms of disadvantages. Given the key to those, you won't do change the data. What is in a disadvantage

06:13

now for us, a common private key cryptography system

06:16

data encryption system is dance, which is 64 bit. And then we have the advanced encryption standard, which is A S, which is 128 bit to 256 bit.

06:31

Turn that teaching out toward discussion of asymmetric encryption

06:35

as opposed to symmetric encryption,

06:38

asymmetric encryption. Use a pair of public E and a private key to encrypt

06:44

and decrypt messes when communicating.

06:47

Turn our attention toward a symmetric key cryptography. This system uses different keys for encrypted encrypting the message. It solves the problem of getting the key to those you won't make. Change The data Whip

07:01

two keys. Working as a pair

07:03

wondering crypt in the other two to decrypt

07:08

some asymmetric inverse. It is related to each other. One key other words. We have a secret kill. Private Key is known only to one person.

07:16

The other key, which the public is known to many people

07:19

in terms of services off photography. It provides authentication and non repudiation. Other words encrypted this with this cinders secret key

07:30

in terms of company. Jolly encrypting what the receivers, public key authentication anchored. In other words, comforting Jolly. First encrypted with the send a secret key and secondly, what the receivers public key.

07:45

This brings us to the term hashing

07:46

now hasn't issues for insurance in the integrity of the data

07:51

it one way function. Other words that generates a fixed size representation of the input

07:57

in terms of collision. When the hats function generates, the same output for different imports is considered what we call a collision.

08:07

So, in other words, is a form of photography. In other words, when you look at in terms of photography, a song is a random data. This use as an additional input into a one way function that hashes the data or password or past praise, in other words,

08:26

now is a random or semi random number that's generated for a specific use. Typically relate to create a graphical communication or information technology.

08:39

*** Allegation Vector is a random number used in combination with a secret key as a means to encrypt your data.

08:46

It is similar to now, except that they're random number must be so like that in a non predictable weight. In other words, the initialization vector must be truly random and not sequential.

09:01

The next concept we need discuss or highlight is called elliptic curve.

09:05

Elliptic curve is an approach to your public key cryptography based on algebraic structure of elliptic curves over finite fields.

09:15

They were weak or deprecating algorithm, which can best be defined as an encryption of decryption algorithm that uses a key off insufficient link.

09:26

Then we have key exchange, which is a method in photography by which cryptographic keys are exchanged between two parties allowing the use of a cryptographic ALS algorithms

09:37

after you choose your crib. Tobacco hashing algorithm and organization can implement a digital signature system that uses digital signatures algorithms to provide proof that a message originated from a particular center and ensure that the missus was not modified while in transit between the sender and the recipient.

09:58

Digital signature algorithm rely on a combination public you photography

10:01

and hashing functions and Short is a mathematical scheme for verifying the authenticity of your dessert messages or documents.

10:11

Then we have the fusion.

10:13

One of the two operation that cryptographic algorithm rely on to obscure your plain text messages is the fusion. The other is confusion, so we think about the fusion. It occurs when a change in your playing text results and multiple changes spread throughout the Cyprus text,

10:31

then we have confusion. Basic is a cryptographic algorithm that relies on obscure plain text messages.

10:39

It occurs when each binary digit orbit

10:43

of this site protect depends on several positive key, obscuring the connection between the two.

10:50

This brings us to our post assessment quiz for this particular video presentation,

10:54

and this is in fact a chew off false statement and it reads as follow.

11:00

A disciple certificate is not a mathematical skiing for verifying the authenticity of a dessert messages or documents. Is this true or false?

11:13

In this case, if you should let the false you're absolutely correct because the desiccant certificate is in fact a mathematical scheme for verifying the authenticity of digital messages or documents.

11:26

Let's not turn out to short a discussion of the key takeaways from this particular video.

11:31

We learned that the work photography was corn by combining two Greek words crypto meeting, hitting and graphene, meaning writing.

11:39

We also learned that perfect four secrecy is a mechanism to prevent the compromise of a private key used to create session keys from compromising past session keys.

11:50

We learned it Symmetric encryption uses a single key that needs to be shared among the people who needs to receive the message.

11:56

And lastly, asymmetric encryption uses a pair of public and a private key to encrypt and decrypt messages. When communicating

12:05

and our upcoming presentation were continuing our discussion of learning objectives 6.1, where we continue to comparing contrast basic concepts of cartography. And again, I look forward to seeing you in the very next video.

### Up Next

### CompTIA Security+

Interested in the cybersecurity industry? The CompTIA Security+ is the gold standard for those looking to enter the cybersecurity industry. Join thousands of professionals who have gained this certification through this course and launched their careers in information security.

### Instructed By

Jim Hollis

Instructor