Course intro

Encryption 101 Introduction
1 minutes
Share the link to this page
Copied
  Completed

Transcript

Welcome to cryptography for beginners with open SSL part two. In my previous course, I have laid the foundation for three main topics, symmetric encryption, asymmetric encryption using the public and private keys and hash functions. In this course, we will dive into two topics and understand the inner part. We will look at key generation which includes permutation of the bitstream swapping them shifting the bits substitute each bit with another and finally doing the XOR bitwise operation. You will learn the basic of modern encryption operations. We will also look at the block ciphers mode of operation how For algorithms join the block ciphers together and send them along a key concept of every symmetric encryption.

And then we will learn how for hash hash functions are calculated to keep our messages intact. How do we keep the integrity and authenticity of our files using salted hash and Max Message Authentication codes, and H max a cryptographic hash functions? All right. So come along and let's start

Sign Up

Share

Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.