7 hours 6 minutes
Hey, everyone, welcome back to the course in this video. We're gonna go over a brief introduction to cryptography. So specifically, we'll talk about the difference between symmetric and asymmetric encryption. We also talk through some different algorithms of asymmetric and symmetric encryption, and we'll talk about the difference between block and stream ciphers.
I do want to stress that this is a very, very high level overview
of these particular topics. So you're not gonna be an expert in these areas by the end of this video.
So what is symmetric encryption? Well, this is where we use a single secret key to encrypt and decrypt messages. So, um, this is faster than a symmetric simply because we're using that single key and not using a public and private key. Some example. Algorithms for symmetric encryption are triple deaths A s to fish blowfish
as well as RC or the rivers cipher
for asymmetric encryption. As a mention of public and private key, you want to know that difference? If you decide to go take the easy counselor certified ethical hacker examination, you wanna know that symmetric is a single key and asymmetric? We're using that public and private key
and some example algorithms are the Diffie Hellman, E C c Algom O and R s. A.
So let's talk about the difference between block and stream ciphers. So with a stream cipher, the data is basically being encrypted One bite at a time. So very slow. So an example of that *** RC four with a block cipher. The data is broken into fixed sized blocks, and so then it's encrypted. Example of that is gonna be the A E s encryption.
So a quick quiz question here, this type of encryption algorithm uses both of public and private key. Is that gonna be blowfish A e s or R s? A.
So you had no the algorithms, right. You have to keep in mind the algorithms when we talked about symmetric and asymmetric encryption. So the answer here is gonna be our PSA.
All right, so in this video, we just talked about the difference between symmetric and asymmetric encryption. Again, remember, asymmetric has a public and private key Very important. If you decide to go take the CH exam that you know that difference.
We also talked about some of the different symmetric algorithms as well as asymmetric. And we talked about the difference between block and stream ciphers
Ethical Hacking (CEH Preparation)
Master the core techniques and technologies of penetration testing and ethical hacking and assess the ...
Kali Linux Fundamentals
If you’re interested in penetration testing and ethical hacking, then this Kali Linux course is ...
1 CEU/CPE Hours Available
Certificate of Completion Offered