1 00:00:09,700 --> 00:00:14,890 Cryptography is used to secure communication between networked devices. 2 00:00:14,890 --> 00:00:21,160 In this section I will cover the concepts that are used for cryptography. 3 00:00:21,160 --> 00:00:28,240 Encryption is used to provide data confidentiality for securing communication between network devices 4 00:00:29,290 --> 00:00:37,990 without encryption data assent and clear text and can be seen by unauthorized users when data is encrypted 5 00:00:38,380 --> 00:00:47,380 it is sent as cipher text and needs to be decrypted to be seen as clear readable text with encryption 6 00:00:47,830 --> 00:00:51,300 keys are used to encrypt and decrypt data. 7 00:00:53,780 --> 00:00:58,670 One way to use keys for encrypting traffic is with symmetric encryption. 8 00:00:58,670 --> 00:01:06,900 This type of encryption uses the same key for encryption and decryption some examples of symmetric encryption 9 00:01:06,900 --> 00:01:17,270 are does three does and a yes another method of using keys to encrypt data is asymmetric encryption 10 00:01:18,080 --> 00:01:27,340 asymmetric encryption uses different keys for encryption and decryption an example of asymmetric encryption 11 00:01:27,640 --> 00:01:37,970 would be RSA with encryption there are rules called ciphers the different types of ciphers are substitution 12 00:01:38,430 --> 00:01:46,800 poly alphabetic and transposition these ciphers just provide different ways to encode data for example 13 00:01:47,100 --> 00:01:50,620 a substitution cipher substitutes values. 14 00:01:50,880 --> 00:01:57,960 So ABC and clear text would be encrypted as an LP by simply substituting the letters with different 15 00:01:57,960 --> 00:02:07,670 ones based on the cipher values hashing provides data integrity to ensure that data has not been modified 16 00:02:08,980 --> 00:02:17,340 hashing is achieved by generating hash values for data that can be compared if both sides compute the 17 00:02:17,340 --> 00:02:20,350 same hash value for transfer data. 18 00:02:20,640 --> 00:02:23,040 Then the data has not been modified. 19 00:02:23,550 --> 00:02:30,940 If hash values do not match then the data would be considered to be corrupt some hashing methods are 20 00:02:30,940 --> 00:02:35,740 empty five shall one shot two and H Mac.