Secure Programming: Encryption


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

In this 5-video course, learners discover the basics of cryptographic algorithms. You will receive a general overview of symmetric algorithms such as AES, Blowfish, and Serpent. You will also examine asymmetric algorithms such as RSA (Rivest, Sharmir, and Adelman), Diffie-Hellman, and elliptic-curve cryptography (ECC). More importantly, you will learn when to use which algorithm and what algorithms are better for specific purposes. You will then move on to integrity algorithms, including hashes like SHA (Secure Hash Algorithm 1), MD5 (Message Digest 5), and 6, RIPEMD (Ripe Message Digest), and HAVAL, as well as message authentication codes (MACs) and HMACs (keyed-hash message authentication codes). You will also examine the strengths and weaknesses of these different approaches. The goal is whether one can make intelligent choices about which algorithms to implement for which purpose; whether one's concerns are about confidentiality; if one needs to do key exchange; is message integrity an issue; are you storing passwords? These will each require different algorithms.



Expected Duration (hours)
0.3

Lesson Objectives

Secure Programming: Encryption

  • discover the key concepts covered in this course
  • describe symmetric algorithms including AES, Blowfish, and Serpent
  • describe asymmetric algorithms including RSA, ECC, and Diffie-Helman
  • describe hashing algorithms such as MD5 and SHA as well as MAC and HMAC
  • summarize the key concepts covered in this course
  • Course Number:
    it_spsecpdj_03_enus

    Expertise Level
    Intermediate