From the course: CompTIA SecurityX (CAS-005) Cert Prep

Unlock this course with a free trial

Join today to access over 24,300 courses taught by industry experts.

Survey of cryptographic techniques

Survey of cryptographic techniques

- I'm going to go pretty quick through this lesson because this is really a review of things that you should have learned as a Security+ certification attainer or practitioner, so it'll be a review starting with symmetric cryptography, known as secret-key cryptography, where encryption is using the same key, so the same key is used to encrypt that decrypts the data. This is the oldest form of cryptosystem. It goes back to recorded history. Symmetric cryptography uses a single key for both encryption and decryption, and it must be kept secret and shared only with the authorized parties. It's efficient, generally faster, and requires less computational power as compared to its counterpart, asymmetric cryptography. It makes it suitable for encrypting bulk or large amounts of data. It's used for data encryption, commonly data at rest, such as files or object storage, or volume or block storage, or maybe data in a database. It's also used to secure data in transit, such as encrypting…

Contents