This course introduces the fundamental concepts of cryptography. It covers the key terminology and common use cases for cryptography. The course also explains symmetric cryptosystems, provides an overview of common hashing algorithms and common implementation concerns.
Cryptography BasicsDuration: 17:16
In this episode, Mike goes over the goals and methods used in cryptography.
Cryptographic MethodsDuration: 7:29
In this episode, Mike shares various methods used in cryptography, and the various methods used to protect the keys.
Symmetric CryptosystemsDuration: 11:49
In this episode, Mike describes encrypting and decrypting data with the same key.
Symmetric Block ModesDuration: 7:50
In this episode, Mike talks about the usage and benefits of block modes when used in symmetric encryption.
RSA CryptosystemsDuration: 10:23
In this episode, Mike describes encrypting and decrypting data with different keys.
Diffie-HellmanDuration: 6:47
In this episode, learn the Diffie-Hellman key exchange agreement and methods as Mike conceptualizes this very complex algorithm.
PGP/GPGDuration: 9:50
In this episode, Mike works though the ups and downs of the PGP/GPG encryption methods.
HashingDuration: 7:20
In this episode, Mike shows how a hash provides integrity to data.
HMACDuration: 3:51
In this episode, Mike explains how hashing can improve message security.
StenographyDuration: 5:42
In this episode, Mike illustrates that information can be hidden within other data.
Certificates and TrustDuration: 13:51
In this episode, Mike explains certificates and how they are used to establish trust.
Public Key InfastructureDuration: 20:53
In this episode, Mike discusses public key infrastructure (PKI), used to enable commerce and other secure activities over the Internet.
Cryptographic AttacksDuration: 24:18
In this episode, Mike explains how encrypted information is at risk and explores ways to protect it.