From the course: Ethical Hacking: Cryptography

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Fundamentals of public key infrastructure (PKI)

Fundamentals of public key infrastructure (PKI)

From the course: Ethical Hacking: Cryptography

Fundamentals of public key infrastructure (PKI)

- [Instructor] With all the knowledge you've learned to this point, we can now focus on the use cases for implementing cryptographic solutions. We started with understanding encryption versus hashing and highlighting the common algorithms associated with those methods for protecting data. There are three states of data. One is data at rest, which you can think of is literally sleeping. Data at rest means it's written on some type of storage device or system, such as a disk or USB stick. The next state of data is in transit, which means it's moving across the network. We're going to look at some pretty cool end-to-end encryption solutions in this space. The last state is data in use, which means it's being actively consumed by systems or people. We'll concentrate on solving the problems of preventing the data from being read or tampered with, especially while being stored, or at rest, and emailed, or in transit. First, we must highlight that strong cryptography depends on some degree…

Contents