Get a month of TabletWise Pro for free! Click here to redeem
Share the link to this class

This course focus is on symmetric encryption and hash functions, we will understand the inner parts, while still making the learning curve fun and simple.

We will look at the secret key generation, how do we generate keys, it is much more complex than you thought.

It involves permutations of the bitstream, swapping bits, shifting, substitution them, and finally doing the XOR bitwise operation.

What will you learn in this course?

We will dive into block ciphers mode of operation, how algorithms join the block ciphers together and send them along, a key concept of every symmetric encryption.

What will you learn of hash functions?

Hash functions are calculated to keep our messages intact.

How do we keep the integrity and authenticity of our files using salted hash and MAC's- Message Authentication Codes and humans, cryptographic hash functions.


You should have basic computer skills.

All Classes
Free for 30 Days
   The video is currently being processed.
   An error occurred while uploading the video. Please upload another video.
   Please upload the required file.
Quiz: #TITLE#
Quiz: #TITLE#
Quiz: #TITLE#
Result: You correctly answered out of questions. Result: You correctly answered out of question. Result: You correctly answered out of questions attempted. Result: You correctly answered out of question attempted. Result: You did not attempt any question.
This class has not been saved

Sign Up