Get a month of TabletWise Pro for free! Click here to redeem 
TabletWise.com
 
28
Views
1:05:20
Share the link to this class
Copied

This course focus is on symmetric encryption and hash functions, we will understand the inner parts, while still making the learning curve fun and simple.

We will look at the secret key generation, how do we generate keys, it is much more complex than you thought.

It involves permutations of the bitstream, swapping bits, shifting, substitution them, and finally doing the XOR bitwise operation.

What will you learn in this course?

We will dive into block ciphers mode of operation, how algorithms join the block ciphers together and send them along, a key concept of every symmetric encryption.

What will you learn of hash functions?

Hash functions are calculated to keep our messages intact.

How do we keep the integrity and authenticity of our files using salted hash and MAC's- Message Authentication Codes and humans, cryptographic hash functions.

Requirements

You should have basic computer skills.

All Classes
Free for 30 Days
   The video is currently being processed.
   An error occurred while uploading the video. Please upload another video.
   Please upload the required file.
Quiz: #TITLE#
Questions: #QUESTIONS_COUNT#
Quiz: #TITLE#
Question /#QUESTIONS_COUNT#
Quiz: #TITLE#
Result: You correctly answered out of questions. Result: You correctly answered out of question. Result: You correctly answered out of questions attempted. Result: You correctly answered out of question attempted. Result: You did not attempt any question.
0
Saves
28
Views
This class has not been saved

Sign Up