Modes of Operation & Algorithms

  • 18 Videos | 1h 2m 20s
  • Includes Assessment
  • Earns a Badge
Likes 30
Cryptography is far more than just selecting an algorithm and calling the encrypt or decrypt method. Explore the modes of operation for encryption algorithms as well as when particular algorithms are best suited to the data being protected.

WHAT YOU WILL LEARN

  • describe and identify data that has been encrypted using the ECB mode
    specify how Cipher Block Chaining uses an IV, or initialization vector, to make data appear random
    describe how Propagating Cipher Block Chaining mode improved on CBC by causing small changes to each block encrypted
    describe the Cipher Feedback mode and how it builds on CBC and makes a block cipher into a stream cipher
    describe the Output Feedback mode and how it can use the same process for encryption and decryption
    describe the Counter mode and how It can be used for parallelizing encryption and decryption
    use a simple aes implementation to encrypt and decrypt data and compare the results to the NIST standard to confirm operation of the algorithm
    describe how the DES and 3DES algorithms work to encrypt and decrypt data
    describe the Blowfish block cipher algorithm and its properties
  • describe the RC4 streaming cipher and its properties
    describe the ElGamal cipher algorithm and its usage
    describe the RSA public-key encryption and its operation
    describe the deprecated MD5 and SHA1 algorithms and the newly chosen replacement, SHA3
    apply and describe the operation of the SHA2 hashing algorithms
    describe the Hash Message Authentication Code, or HMAC, and its use to authenticate and verify the integrity of a message
    identify and describe basic key management policies and procedures
    describe how to cryptographically exchange keys securely
    identify the role and purpose of key escrow policies and procedures

IN THIS COURSE

  • Playable
    1. 
    Describing Electronic Codebook (ECB)
    2m 52s
    UP NEXT
  • Playable
    2. 
    Using Cipher Block Chaining (CBC)
    3m 48s
  • Locked
    3. 
    Using Propagating Cipher Block Chaining (PCBC)
    3m 32s
  • Locked
    4. 
    Using Cipher Feedback (CFB)
    3m 49s
  • Locked
    5. 
    Using Output Feedback (OFB)
    3m 5s
  • Locked
    6. 
    Describing Counter (CTR)
    3m 11s
  • Locked
    7. 
    Using the AES Block Algorithm
    3m 31s
  • Locked
    8. 
    Applying the DES/3DES Block Algorithm
    3m 11s
  • Locked
    9. 
    Describing the Blowfish Block Algorithm
    3m 30s
  • Locked
    10. 
    Describing the RC4 Streaming Algorithm
    3m 21s
  • Locked
    11. 
    Describing the ElGamal Algorithm
    2m 46s
  • Locked
    12. 
    Defining the RSA Algorithm
    3m 15s
  • Locked
    13. 
    Describing MD5, SHA1, and SHA3
    4m 31s
  • Locked
    14. 
    Using SHA2
    2m 32s
  • Locked
    15. 
    Describing HMAC
    2m 36s
  • Locked
    16. 
    Describing Key Management
    6m 37s
  • Locked
    17. 
    Describing Key Exchange
    3m 21s
  • Locked
    18. 
    Describing Key Escrow
    2m 52s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE