Cryptography Basics
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Time
15 hours 43 minutes
Difficulty
Advanced
CEU/CPE
16
Video Transcription
00:00
>> Let's go ahead and pick up with
00:00
the basis of cryptography.
00:00
Now, I know some of you are cryptography experts.
00:00
I also know that some of you are
00:00
brand new to cryptography.
00:00
That's generally the level that I like to teach,
00:00
at least starting is I want to teach
00:00
cryptography like you don't have
00:00
experience or exposure to it.
00:00
In that way, that just make sure that we're all
00:00
starting from a level playing field and
00:00
that we all have an understanding
00:00
of some of these terms we're
00:00
going to be throwing around while
00:00
we do talk about crypto.
00:00
If you are cryptography expert,
00:00
you can just go to that happy place
00:00
in your head where nothing bothers you.
00:00
Then you can jump back in
00:00
as we start to get to some more advanced ideas.
00:00
Let's look at what we're going to cover in this section.
00:00
This section we're going to focus
00:00
on why we use cryptography?
00:00
What services do we get from cryptography?
00:00
Then we're going to talk about the elements that are
00:00
necessary to take our plain,
00:00
unencrypted text into ciphertext or encrypted text.
00:00
Security services that are provided by cryptography.
00:00
If you were to stop folks out in the street and say,
00:00
"Why do we use cryptography?"
00:00
I'll guarantee you almost every single person
00:00
is going to say something to
00:00
the effect of we use it
00:00
for privacy, confidentiality, secrecy.
00:00
That is absolutely right.
00:00
Privacy is one of
00:00
the main reasons that we use cryptography.
00:00
We want to keep our secrets secret.
00:00
Secrecy, privacy, confidentiality,
00:00
those all go together and they're all about
00:00
preventing unauthorized disclosure of information.
00:00
The most common use of cryptography, absolutely.
00:00
But we also have to
00:00
consider cryptography for authenticity.
00:00
Now when we talk about authenticity,
00:00
authenticity allows us to verify a claimed identity.
00:00
I claim to be Kelly Handerhan.
00:00
But anybody can claim to be anybody.
00:00
if I claim to be Kelly Handerhan,
00:00
you should challenge me and say, "Prove it."
00:00
I can prove my identity by using cryptography as well.
00:00
Now the third service that we can get
00:00
from cryptography is integrity.
00:00
Integrity means that we want a means of
00:00
detecting modification or corruption.
00:00
Modification can be done.
00:00
Corruption does modify files,
00:00
but modification can also
00:00
entail malicious modification as well.
00:00
I want an assurance that
00:00
the message or the content has not changed.
00:00
I can get that with cryptography also.
00:00
Then the last desirable security service
00:00
is non-repudiation.
00:00
Non-repudiation is a combination
00:00
of authenticity and integrity.
00:00
Basically what that says is that if I send a message,
00:00
"I can't say, that message didn't come from
00:00
me," and I also can't dispute its contents.
00:00
I can't say, "The message came from me,
00:00
but the contents must have changed."
00:00
Really non-repudiation is a combination of
00:00
authenticity and integrity together.
00:00
A sender can't dispute having sent the message,
00:00
and they can't dispute
00:00
the contents of the message as well.
00:00
If you're ever curious about
00:00
what services cryptography can provide,
00:00
think about the pain of cryptography; privacy,
00:00
authenticity, integrity, and non-repudiation.
00:00
Now I'll also mention that I
00:00
want you to have this concept in mind.
00:00
I'm going to give you a little formula here.
00:00
Plain text plus initialization vector plus an algorithm
00:00
plus a key are
00:00
used to take this plain text into ciphertext.
00:00
When you combine those, ideally,
00:00
you'll produce ciphertext which is encrypted text.
00:00
We're going to go into the details of
00:00
what an initialization vector is, what's an algorithm?
00:00
What's a key and how did they work
00:00
together in the next section.
00:00
That's going to be your cliffhanger to have
00:00
you running on to the next segment.
00:00
But in this section,
00:00
we just talked about some of
00:00
the applications of cryptography.
00:00
Don't forget pain, privacy,
00:00
authenticity, integrity, and non-repudiation.
00:00
Then also leading into our next section,
00:00
start with plain text using the initialization vector,
00:00
an algorithm and a key to get ciphertext.
Up Next
Instructed By
Similar Content