How to Implement Public Key Infrastructure (PKI) Solutions and Cryptography

preview_player
Показать описание
CBT Nuggets trainer Bob Salmans covers encryption. Bob uses visuals to explain what encryption is, how it’s done with private and public key pairs, and what the Public Key Infrastructure has to do with it. If you’ve got questions about symmetric or asymmetric encryption methods, this video helps clarify the process.

Encryption is converting plain text into unreadable data called cipher text. Encryption protects data against unauthorized viewing (referred to as Confidentiality in the C-I-A triad). Encryption also protects data against unauthorized manipulation or alteration (also referred to as Integrity in the CIA triad).

Symmetric encryption is one of the two types of encryption schemes. Symmetric encryption uses the same key (called a “secret key”) to encrypt and decrypt the data. Examples of this are 3DES and AES. Asymmetric encryption is the other major type of encryption, it uses two different keys. In asymmetric encryption, one key encrypts, and the other decrypts. It also relies on a public key which is shared, and a private key which must be kept secure and not shared. The keys are stored and distributed by the Public Key Infrastructure (PKI). Examples of asymmetric encryption are RSA, ECC and Diffie Hellman.

The most important part of PKI and asymmetric encryption is the pairing of the private key with the public key. When encrypting messages via PKI, the sender uses the public key to encrypt the message and the private key is used to decrypt the message. It’s also possible to encrypt a message with the private key and have the public key decrypt it.

0:00 – Introduction how to implement PKI solutions and cryptography
0:20 – The definition of encryption and its use in cryptography
1:25 – Symmetric encryption is one of the two major types of encryption schemes
3:10 – How asymmetric encryption differs from symmetric encryption
5:05 – Using a public key and a private key pair to encrypt and decrypt messages

-----------------
Connect with CBT Nuggets for the latest in IT training:

#encryption #pki #cryptography #ittraining #cbtnuggets
Рекомендации по теме
Комментарии
Автор

Great entertaining way of explaining PKI. Kudos!

chessmambo
Автор

Great video - clear and informative with great visuals. More of this please

acmshift
Автор

Nice video, thanks for creating. I see an issue with the last e.g. there around Bob using private key to encrypt message and Lois decrypting it with Bobs public key. If Eve can also grab Bob's public key, then she too can intercept and read the message right? Would Bob not be better to use Lois' public key to encrypt and send message to Lois?

epicswell
Автор

Doesn't explain how keys are distributed. That is the main point of PKI.

jiwann