BRAND: Introduction to Cryptograpy and Symmetric Encryption


Introduction to Cryptography and Symmetric Encryption

Learning Outcomes

After completing these activities, you should be able to:


In this section we will learn how cryptography can be used to defend our networks and secure our data. In an earlier lesson we learned about the tenets of cybersecurity (AKA CIA-triad), to include, confidentiality, integrity, and availability. Over this and the next several lessons we will learn about several cryptographic techniques that can be used to be used to support the cybersecurity tenets of confidentiality and integrity: symmetric encryption and asymmetric encryption. We will learn through the use of simple examples and then see encryption in action through the use of real-world tools. Finally, we will discuss and explore several attacks on these techniques.

What is Cryptography

Cryptography is the study and practice of hiding information. Cryptography has been around for a long time - Julius Caesar is known to have used it. In fact, Cryptos comes from the Greek word hidden. Today, cryptography is a core component of how we secure modern communication networks and the data critical to our daily lives. To make this happen mathematicians work tirelessly to craft new cryptographic algorithms and ensure that the current algorithms are still secure. At this very moment there are mathematicians dealing with the new challenges of quantum computers and other technological advances. In this course we will cover just a small fraction of the encryption algorithms that are in use today. The two fundamental areas of cryptography that we'll look at in this course include: