# Introduction to Cryptography

Video Activity
Join over 3 million cybersecurity professionals advancing their career
or

Time
7 hours 6 minutes
Difficulty
Intermediate
CEU/CPE
7
Video Transcription
00:00
Hey, everyone, welcome back to the course in this video. We're gonna go over a brief introduction to cryptography. So specifically, we'll talk about the difference between symmetric and asymmetric encryption. We also talk through some different algorithms of asymmetric and symmetric encryption, and we'll talk about the difference between block and stream ciphers.
00:17
I do want to stress that this is a very, very high level overview
00:20
of these particular topics. So you're not gonna be an expert in these areas by the end of this video.
00:27
So what is symmetric encryption? Well, this is where we use a single secret key to encrypt and decrypt messages. So, um, this is faster than a symmetric simply because we're using that single key and not using a public and private key. Some example. Algorithms for symmetric encryption are triple deaths A s to fish blowfish
00:46
as well as RC or the rivers cipher
00:49
for asymmetric encryption. As a mention of public and private key, you want to know that difference? If you decide to go take the easy counselor certified ethical hacker examination, you wanna know that symmetric is a single key and asymmetric? We're using that public and private key
01:03
and some example algorithms are the Diffie Hellman, E C c Algom O and R s. A.
01:10
So let's talk about the difference between block and stream ciphers. So with a stream cipher, the data is basically being encrypted One bite at a time. So very slow. So an example of that *** RC four with a block cipher. The data is broken into fixed sized blocks, and so then it's encrypted. Example of that is gonna be the A E s encryption.
01:30
So a quick quiz question here, this type of encryption algorithm uses both of public and private key. Is that gonna be blowfish A e s or R s? A.
01:38
So you had no the algorithms, right. You have to keep in mind the algorithms when we talked about symmetric and asymmetric encryption. So the answer here is gonna be our PSA.
01:49
All right, so in this video, we just talked about the difference between symmetric and asymmetric encryption. Again, remember, asymmetric has a public and private key Very important. If you decide to go take the CH exam that you know that difference.
02:00
We also talked about some of the different symmetric algorithms as well as asymmetric. And we talked about the difference between block and stream ciphers
Up Next
Penetration Testing and Ethical Hacking

The Penetration Testing and Ethical Hacking course prepares students for industry penetration testing certifications, like CEH. This course walks students through the process of gaining intelligence, scanning and enumerating and hacking the target.

Instructed By