12 hours 41 minutes

Video Description

This lesson offers an introduction into cryptography and covers the following topics: • Historical uses of cryptography • Security services provided by cryptography • Definitions and terms • Symmetric cryptography • Asymmetric cryptography • Hybrid cryptography • Integrity through hashing, MACs and Digital Signatures • Public Key Infrastructure • IPSec • Attacks on Cryptography

Video Transcription

Okay, Now we're gonna move to the second major section of security Engineering. And that's cryptography, Which is, of course, everybody's favorite topic. So welcome to the great crypto Pollux Za T shirts will be available later. This is a significant topic on the exam. You've got a good understanding of cryptography.
Um, you don't have to get really deep under the hood. You don't have to have modular math in your back pocket.
You don't need a doctor in Krypton. But you do need to have some foundational concepts when it comes to especially understanding symmetric cryptography versus asymmetric cryptography. And then how the two are used together to give us all the security
qualities that are desirable. So in this section, we're going to cover the historical uses of cryptography. And the only reason we're covering that going back to the Caesar cipher and so on is because it is testable.
Well, what about the security service is that cryptography provides us because traditionally we've always thought privacy Well, cryptography can do much more than just give us privacy definitions in terms. I try to teach cryptography like you have absolutely no experience with it, and I know that some of you do. So
if you're a crypto expert, you can just go to that happy place in your head where nothing bothers you
and just stay there because I promised will pick up the steam and we'll get a little bit more sophisticated as we move on. But I want to make sure that we don't lose anybody in the interim. So I wanted just to define some terms like initialization vectors, algorithms and keys and make sure we all understand.
But then the next three sections right here in the middle, symmetric cryptography, asymmetric cryptography and hybrid. How the three of them work together to provide us the security service is that we need, and then we'll talk about how we get integrity.
Ah, if you recall from earlier integrity is that we want to guarantee against modification
or deletion of a file or the document or whatever that may be, and we get integrity through hashing message authentication codes and digital signatures. Man, that Mac acronym is tricky because it's used three different ways in this class and two other ways outside of this class that I know love. So in this instance,
in the crypto section Max stands for message
authentication code that gives us integrity is one of many ways. All right, well, look at public key infrastructures. A p. K. I am sure most people have heard off. We'll talk about what they are and why they're necessary. And then we will look at I p sec, which, of course, is Internet protocol security.
And last but not least, we will discuss attacks on cryptography.
So a lot of information here in previous versions of the C I S S P exam crypto got its own domain. Eso just because that they've embedded it into the security engineering chapter. Please don't make the mistake of thinking that they're not focusing on it to several
very, very testable. So in just a moment, we'll get started with the history of cryptography.

Up Next


Our free online CISSP (8 domains) training covers topics ranging from operations security, telecommunications, network and internet security, access control systems and methodology and business continuity planning.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor