Risk Management

5 hours 20 minutes

Video Description

This lesson covers hybrid cryptography. In hybrid cryptography the client initiates a secure connection and the server responds by sending its public key to the client who then generates a symmetric session key. The client then encrypts ad uses the server's public key to encrypt the session key. Then, the client sends the session key (encrypted with the server's public key) to the server. The server uses its private key to decrypt the session key. Now that a symmetric key has been distributed, both parties have a secure channel across which to communicate. For the ultimate safety, obtain a digital signature by hashing a message and then have the hash encrypted by the sender's private key. Digital signatures offer authenticity, integrity and non-repudiation and gives us all the services of cryptography.

Up Next

Risk Management

It is defined as the forecasting and evaluation of risks together with the identification of procedures to avoid or minimize their impact

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor