From the course: Security Tips: Protecting Sensitive Information
Unlock the full course today
Join today to access over 23,200 courses taught by industry experts.
Shared key and public key encryption
From the course: Security Tips: Protecting Sensitive Information
Shared key and public key encryption
- When we're working with encryption, there's two primary types of encryption that we'll use. These are symmetric or shared key encryption and asymmetric or public key encryption. There's a whole lot of math behind both kinds and that's not the focus of this course. What's important here is to understand the high level differences between these types of encryption. How they work and what implications those differences have for how data is secured. When we encrypt information, we have two states of that information to think about. The first, before something is encrypted is often referred to as the plaintext version. Even if the information being encrypted is not text such as when it's binary data representing an image or some other kind of file. When something is encrypted, we take the plaintext and apply a mathematical transformation to it, turning it into ciphertext, the encrypted version of the plaintext. This…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.