From the course: JavaScript: Security Essentials
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
List of the crypto libraries - JavaScript Tutorial
From the course: JavaScript: Security Essentials
List of the crypto libraries
- [Instructor] Now that you understand the basics of cryptography, let's explore a bit further on the subject so you understand better what you'll be using and the tooling. At the heart of cryptography is symmetric encryption, where the same key is used for both encrypting and decrypting. This method is fast and efficient, making it ideal for large amounts of data, but it requires that the sender and receiver both securely exchange the key beforehand. Popular symmetric encryption algorithms includes AES and DES. In contrast, asymmetric encryption uses two different keys, a public key for encryption and a private key for decryption. The public key can be shared with anyone, but only the private key can decrypt a message, which ensures confidentiality. This method is more secure for key exchange since there's no need to share the private key. However, it's slower than symmetric encryption, and it is often used in combination with symmetric methods for efficiency. RSA is a widely used…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.