-
Apply Cryptographic Modes and Algorithms
After watching this video; you will be able to apply cryptographic modes and algorithms.
-
Applying Non-repudiation to Cryptography
After watching this video; you will be able to describe how cryptography can be used to prove; with high certainty; that an action or statement is associated with an entity.
-
Applying the DES/3DES Block Algorithm
After watching this video; you will be able to describe how the DES and 3DES algorithms work to encrypt and decrypt data.
-
Creating or Generating Keys
After watching this video; you will be able to describe the creating; or generating; of keys and how the key strength is critical to cryptographic ciphers.
-
Defining Cryptography Authentication
After watching this video; you will be able to define how cryptography can provide a means to authenticate an entity.
-
Defining the RSA Algorithm
After watching this video; you will be able to describe the RSA public key encryption and its operation.
-
Defining Why Cryptography is Difficult
After watching this video; you will be able to describe why cryptography is difficult to get right and how poor cryptography can give you a false sense of security.
-
Describing Counter (CTR)
After watching this video; you will be able to describe the Counter mode and how It can be used for parallelizing encryption and decryption.
-
Describing Cryptanalysis
After watching this video; you will be able to perform some basic cryptanalysis and describe methods to decrypt poorly encrypted data.
-
Describing Cryptographic Terminology
After watching this video; you will be able to use and identify basic cryptographic terminology.
-
Describing Digital Signatures
After watching this video; you will be able to describe a digital signature and how it can be used for authentication and nonrepudiation.
-
Describing Electronic Codebook (ECB)
After watching this video; you will be able to describe and identify data that has been encrypted using the ECB mode.
-
Describing Export Controls and Limits on Cryptography
After watching this video; you will be able to describe basic export controls and limits that can be imposed on cryptography used around the world .
-
Describing HMAC
After watching this video; you will be able to describe the Hash Message Authentication Code; or HMAC; and its use to authenticate and verify the integrity of a message.
-
Describing How Cryptography Provides Confidentiality
After watching this video; you will be able to describe how cryptography can keep data confidential within limits.
-
Describing Key Escrow
After watching this video; you will be able to identify the role and purpose of key escrow policies and procedures.
-
Describing Key Exchange
After watching this video; you will be able to describe how to cryptographically exchange keys securely.
-
Describing Key Management
After watching this video; you will be able to identify and describe basic key management policies and procedures.
-
Describing MD5; SHA1; and SHA3
After watching this video; you will be able to describe the deprecated MD5 and SHA1 algorithms and the newly chosen replacement; SHA3.
-
Describing Side-channel Attacks
After watching this video; you will be able to identify external methods that can be used to compromise; or bypass; a cryptographic system.
-
Describing Substitution Ciphers
After watching this video; you will be able to describe and use a substitution cipher and understand the weaknesses that can be exploited by an attacker against these ciphers.
-
Describing the Blowfish Block Algorithm
After watching this video; you will be able to describe the Blowfish block cipher algorithm and its properties.
-
Describing the ElGamal Algorithm
After watching this video; you will be able to describe the ElGamal cipher algorithm and its usage .
-
Describing the RC4 Streaming Algorithm
After watching this video; you will be able to describe the RC4 streaming cipher and its properties.
-
Distinguishing between Block and Key Sizes
After watching this video; you will be able to recognize the difference between blocks and key sizes as they apply to cipher algorithms.
-
Formatting the Output
After watching this video; you will be able to describe how to encode encrypted data for easier storage or transport.
-
Hiding Data Using Steganography
After watching this video; you will be able to describe the use of stenography in encryption products to hide the fact data is even encrypted.
-
Identify the Cryptographic Algorithm to Use
After watching this video; you will be able to identify the cryptographic algorithm to use.
-
Identifying Algorithm and Key Strengths
After watching this video; you will be able to identify the features and strengths of cryptographic algorithms and how to select an algorithm for a particular usage scenario.
-
Identifying and Using Entropy
After watching this video; you will be able to describe how entropy is used in generating random numbers and how that entropy is critical to the strength of a cryptographic key.
-
Identifying Historical Use of Cryptography
After watching this video; you will be able to recognize historical uses of cryptography and their relevance to cryptography today.
-
Identifying Secure Communications Over HTTPS
After watching this video; you will be able to identify web browser-based secure communications and the role of certificates and certificate authorities (CAs).
-
Identifying the Current State of Cryptography
After watching this video; you will be able to identify the different types of cryptography and how cryptographic algorithms can be verified and validated.
-
Introducing Cryptography
After watching this video; you will be able to describe and identify the reasons for having and using cryptography.
-
Recognizing the Need for Data Integrity
After watching this video; you will be able to describe why data integrity is an integral part of cryptography.
-
Using a One-time Pad
After watching this video; you will be able to describe how OPT; or one-time pad; cryptography can theoretically provide perfect secrecy but has some significant limitations.
-
Using Cipher Block Chaining (CBC)
After watching this video; you will be able to specify how Cipher Block Chaining uses an IV; or initialization vector; to make data appear random.
-
Using Cipher Feedback (CFB)
After watching this video; you will be able to describe the Cipher Feedback mode and how it builds on CBC and makes a block cipher into a stream cipher.
-
Using GPG with E-mail
After watching this video; you will be able to use GPG to encrypt and decrypt an e-mail message.
-
Using Nonces and the Initialization Vector
After watching this video; you will be able to describe the purpose of an initialization vector for a cipher algorithm and how nonces can be used to protect small datasets.
-
Using One-way Hashes
After watching this video; you will be able to describe the purpose of cryptographic hash functions and how they can be used in cryptography to provide data integrity.
-
Using Output Feedback (OFB)
After watching this video; you will be able to describe the Output Feedback mode and how it can use the same process for encryption and decryption.
-
Using Padding
After watching this video; you will be able to describe and perform padding operations to data for block ciphers.
-
Using Propagating Cipher Block Chaining (PCBC)
After watching this video; you will be able to describe how Propagating Cipher Block Chaining mode improved on CBC by causing small changes to each block encrypted.
-
Using SHA2
After watching this video; you will be able to apply and describe the operation of the SHA2 hashing algorithms.
-
Using Symmetric Algorithms
After watching this video; you will be able to describe and identify the features and use cases for symmetric-key cipher algorithms .
-
Using the AES Block Algorithm
After watching this video; you will be able to use a simple AES implementation to encrypt and decrypt data and compare the results to the NIST standard to confirm operation of the algorithm.
-
Working with Asymmetric Algorithms
After watching this video; you will be able to describe and identify the features and use cases for asymmetric-key cipher algorithms.
-
Working with Disk Encryption
After watching this video; you will be able to describe how disk encryption works and the threats it can help protect against.
-
Working with the Secure Shell (SSH)
After watching this video; you will be able to describe of use of SSL and TLS in security tools like the Secure Shell; or SSH.