From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,800 courses taught by industry experts.

Understanding the different encryption algorithms and post-quantum cryptography

Understanding the different encryption algorithms and post-quantum cryptography

From the course: Certified Ethical Hacker (CEH)

Understanding the different encryption algorithms and post-quantum cryptography

- [Instructor] Crypto algorithms have been around for a long time. I'm not talking about a hundred years, I'm not talking about 200 years, but some of the history dates back to the Roman Empire and luckily nowadays we have stronger crypto algorithms and we're going to continue to evolve the crypto algorithms. I'm talking about encryption algorithms and hashing algorithm both for modern implementation, especially after quantum computers will become more mainstream. We already mentioned that some of these algorithms will be defeated. So what I want to go over is kind of like the history of crypto algorithms. Show you a few examples of those crypto algorithms here. And I'm going to be doing this with a demonstration of a tool called CyberChef. I have it installed in my website, hacker.org/CyberChef. But this is a tool that was actually created by the UK government and it was created for both defensive and offensive cybersecurity operations. In other words, to be able to play around with…

Contents