From the course: Learning Cryptography and Network Security

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Safeguarding cryptography

Safeguarding cryptography

From the course: Learning Cryptography and Network Security

Start my 1-month free trial

Safeguarding cryptography

- [Instructor] One of the most powerful ways to protect data is by using encryption, Even still, there are threats that can compromise the security of our data. Threats include an attack on the encrypted data, which is an attempt to break the code to obtain the plain text. Another threat is having someone obtain your private key in a public key cryptographic system. The advanced encryption standard, AES was adopted as a standard by the U.S government in the early 2000s AES can use up to a 256 bit key, and this considered a strong algorithm that can resist a brute force attack. In addition, asymmetric encryption uses a public key and a private key, which are mathematically related. The private key should always be kept private, and the public key is made public for everyone to see. Because they are mathematically related, both are needed to encrypt and decrypt text. For someone to obtain the private key by using the…

Contents