# Cryptographic Methods

Beginner
• 8 videos | 27m 17s
• Includes Assessment
Rating 4.7 of 43 users (43)
Cryptography uses different methods to protect data. Explore different methods used to protect or transmit data securely, and some of the components that ensure data can be protected.

## WHAT YOU WILL LEARN

• Describe how opt, or one-time pad, cryptography can theoretically provide perfect secrecy but has some significant limitations
Describe and use a substitution cipher and understand the weaknesses that can be exploited by an attacker against these ciphers
Describe and identify the features and use cases for symmetric-key cipher algorithms
Describe and identify the features and use cases for asymmetric-key cipher algorithms
• Describe the use of steganography in encryption products to hide the fact data is even encrypted
Describe the purpose of cryptographic hash functions and how they can be used in cryptography to provide data integrity
Describe a digital signature and how it can be used for authentication and non-repudiation
Identify the cryptographic algorithm to use

## IN THIS COURSE

• Upon completion of this video, you will be able to describe how OPT, or one-time pad, cryptography can theoretically provide perfect secrecy, but has some significant limitations.
• Upon completion of this video, you will be able to describe and use a substitution cipher and understand the weaknesses that can be exploited by an attacker against these ciphers.
• 3.  Using Symmetric Algorithms
Upon completion of this video, you will be able to describe and identify the features and use cases for symmetric key cipher algorithms.
• 4.  Working with Asymmetric Algorithms
Upon completion of this video, you will be able to describe and identify the features and use cases for asymmetric key cipher algorithms.
• 5.  Hiding Data Using Steganography
Upon completion of this video, you will be able to describe the use of steganography in encryption products to hide the fact that data is even encrypted.
• 6.  Using One-way Hashes
After completing this video, you will be able to describe the purpose of cryptographic hash functions and how they can be used in cryptography to provide data integrity.
• 7.  Describing Digital Signatures
Upon completion of this video, you will be able to describe a digital signature and how it can be used for authentication and to prevent denial.
• 8.  Exercise: Identify the Cryptographic Algorithm used
During this video, you will learn how to identify the appropriate cryptographic algorithm to use.

## EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

## YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users (1)

## PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 185 users (185)
Rating 4.6 of 2013 users (2013)
Rating 4.5 of 70 users (70)