Тёмный
No video :(

CISSP Domain 3: DES and AES Cryptography 

CISSPrep
Подписаться 5 тыс.
Просмотров 11 тыс.
50% 1

Опубликовано:

 

5 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 7   
@kandaparanam
@kandaparanam 4 года назад
Thanks for your posting. Please keep on upload and share your valuable knowledge with us.
@ralph17p
@ralph17p 2 года назад
The EDE mode of 3DES relates to the fact that there are two related variants of the feistel network that are used to encrypt the data and decrypt the data. If you "decrypt" the data with a different key, you are effectively encrypting it a second time because the bits will not be anything like what was originally encrypted. As to why this was done, I believe it is to provide backwards compatibility with DES by making k1 and k2 the same, so you do end up with the same data after the first two rounds and then effectively end up with single DES with a key of k3. Seems to me that it would be a really inefficient and niche use case with 3DES hardware having to talk to DES hardware, because presumably if it was a software implementation, the algorithm would just get negotiated down to DES. Maybe if someone has come across a case where this was used IRL, they can educate me...
@rayamoooooo685
@rayamoooooo685 3 года назад
*i would suggest that EDE3 is similar to a router when it re-encapsulates a packet to forward it to a network, so it hold the information but yeah I agree with the public and global you mentioned **02:04** thanks btw :)*
@HardCorps88
@HardCorps88 4 года назад
DSA digital signature algorithm used for digital signatures not encryption.
@CISSPrep
@CISSPrep 4 года назад
Yes, thanks! I drew a blank when going over that slide. Corrections to my rambling are always welcome. :)
@markocastillo3485
@markocastillo3485 3 года назад
Thanks for the lesson. Can I suggest a higher mic volume? Thanks again.
@CISSPrep
@CISSPrep 3 года назад
Absolutely. Thank you for the feedback. :)
Далее
What is PKI?  Public Key Infrastructure
4:12
Просмотров 11 тыс.
Cute kitty gadget 💛💕
00:23
Просмотров 6 млн
Hashing vs Encryption Differences
19:38
Просмотров 168 тыс.
128 Bit or 256 Bit Encryption? - Computerphile
8:45
Просмотров 333 тыс.
CertMike Explains Cryptography
10:15
Просмотров 23 тыс.
CISSP Micro Module: Security Models 2018 - Domain 3
4:40