From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
PGP and GnuPG
From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering
PGP and GnuPG
- [Instructor] Let's take a look at another asymmetric algorithm. In 1991, Phil Zimmerman released an algorithm that he called the Pretty Good Privacy, or PGP algorithm. PGP is still widely used today, and the details are freely available for anyone to use through the OpenPGP standard. PGP uses public and private key pairs, but it performs encryption and decryption in a little more complex manner that combines both symmetric and asymmetric cryptography. Let's first take a look at the encryption process using PGP. The sender of a message has the original plain text, and then generates a random symmetric encryption key. Next, the sender encrypts the message using the random symmetric key and then encrypts the random key using the recipient's public key. The sender then transmits the encrypted message, which is a combination of the encrypted data and the encrypted random key. When the recipient receives that encrypted…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
What is the cloud?3m 53s
-
Cloud computing roles2m 35s
-
(Locked)
Drivers for cloud computing3m 17s
-
(Locked)
Multitenant computing2m 15s
-
(Locked)
Virtualization4m 48s
-
(Locked)
Desktop and application virtualization2m 38s
-
(Locked)
Cloud compute resources7m 52s
-
(Locked)
Containerization1m 58s
-
(Locked)
Cloud activities and the Cloud Reference Architecture2m 49s
-
(Locked)
Cloud deployment models2m 45s
-
(Locked)
Cloud service categories5m 21s
-
(Locked)
Edge and fog computing1m 46s
-
-
-
(Locked)
OWASP Top 105m 36s
-
(Locked)
SQL injection prevention4m 25s
-
(Locked)
Cross-site scripting prevention3m 17s
-
(Locked)
Cross-site request forgery prevention4m 8s
-
(Locked)
Defending against directory traversal3m 6s
-
(Locked)
Overflow attacks3m 21s
-
(Locked)
Session hijacking4m 8s
-
(Locked)
Privilege escalation1m 56s
-
(Locked)
-
-
(Locked)
Understanding encryption2m 49s
-
(Locked)
Symmetric and asymmetric cryptography4m 18s
-
(Locked)
Goals of cryptography3m 47s
-
(Locked)
Codes and ciphers3m 5s
-
(Locked)
Cryptographic math2m 38s
-
(Locked)
Choosing encryption algorithms3m 27s
-
(Locked)
The perfect encryption algorithm3m 21s
-
(Locked)
The cryptographic lifecycle2m 34s
-
(Locked)
-
-
(Locked)
Trust models2m 52s
-
(Locked)
PKI and digital certificates4m 5s
-
(Locked)
Hash functions7m 38s
-
(Locked)
Digital signatures3m 51s
-
(Locked)
Digital signature standard1m 40s
-
(Locked)
Create a digital certificate4m 55s
-
(Locked)
Revoke a digital certificate1m 41s
-
(Locked)
Certificate stapling2m 29s
-
(Locked)
Certificate authorities6m 13s
-
(Locked)
Certificate subjects3m 35s
-
(Locked)
Certificate types2m 55s
-
(Locked)
Certificate formats2m 30s
-
(Locked)