About our courses

Through years of experience working with more than 1000 top companies in the world, we ́ve architected the Readynez method for learning.
Train in any technology using the award-winning Readynez method and combine any variation of learning style, technology and place, to take learning ambitions from intent to impact.

Learn more about Readynez Training

Kevin Henry - Understanding Cryptography Part 2

Feb 2022 by MARIA FORSBERG

In a previous blog we did a quick overview of encryption – looking at the terminology and the use of symmetric algorithms.

Those algorithms are still the main form of encryption used today. They are used, for example, for hard drive encryption, TLS and IPSec and wireless communications.  

Asymmetric Algorithms

In the mid-1970s, we saw the development of a new form of encryption algorithm – the use of asymmetric or public-key encryption. 

 

This started with the work of Diffie-Hellman and continued with algorithms such as RSA and ECC (Elliptic Curve Cryptography). Asymmetric algorithms opened up many new possibilities for us – Authenticity, integrity, non-repudiation and access control – in addition to confidentiality which was the main benefit of symmetric algorithms. 

What are Asymmetric Algorithms?

Asymmetric algorithms are based on the use of a key pair – a set of mathematically related keys that only work as a pair.

These are known as the private key and the related public key. They are based on a one-way function – a process that is easy to go in one direction but computationally infeasible to execute in the inverse direction.

For example, it is simple for the holder of a private key to calculate the public key – but it is not possible for the holder of the public key to determine what the private key is.

2 simple rules

So that leads us to the simple rule – Private keys MUST be kept private – not shared with anyone – or else this whole process is compromised. But the public key does not need to be protected and can be shared with the whole world. Perhaps on a business card, website, email or key ring, 

The other rule we must remember is that the keys ONLY work as a pair – if an operation (function) is done using one half of the key pair – the ONLY key that is used to complete the operation is the other half of the same key pair – the corresponding another half of the key pair.

 If we remember these two rules, then the operation of Asymmetric Algorithms is simple and logical. From this, we can realize the many benefits that asymmetric algorithms can provide. 

Are you with us so far? Keep an eye out for the next blog in the series, or join us for a training course, if you´re keen to learn faster.

We love to teach and share our passion – come join us at Readynez :)

You may be interested in these 1-day Masterclasses with Kevin:

You´re invited to join this live learning experience in a virtual space where you will get full access to insights and innovation from the true authorities.

We think you´re going to love these - Learn more and book directly on the links below:

 

Security - with Kevin Henry

Live Virtual Masterclass: CISSP Overview

Live Virtual Masterclass: CISM Overview

 

Come alone or bring your team for a strengthened direction with a tangible impact - but, don´t wait too long to book - seats are obviously very limited for this unique experience.

About Kevin Henry:

Your instructor has probably taught more IT-Security students than anyone else in the world and helped thousands of people prepare for the examination. As the former co-chair of the ISC2 CISSP CBK, he will provide you with valuable insight into the do's and don'ts of Security training and provide tips on how to plan your own training roadmap. 

Learn more about Kevin here

GET INSPIRED

Latest from the blog

How to Pass the PL-200 exam and become a Microsoft Certified Power Platform Functional Consultant

READ MORE

How to clear the PL-300 exam and become a Microsoft Certified Power BI Data Analyst

READ MORE

MB-300 Exam Preparation and How to become a Microsoft Dynamics 365 Core Finance and Operations Consultant

READ MORE

3 Tips to get prepared

Facilities

Latest resources, technology and programs for all our candidates.

Culture

Educate and create a security culture.

Plan

Address communications with clients, employees, suppliers, media and regulatory bodies.

Are you ready for a new career?

For over a decade, Readynez consultants have been enabling digital transformation with cutting-edge Training, Talent and Learning Services in every type of business – big and small. All over the world.

Where do you start?
With Readynez services that support every vision, you will soon be ready for the future, with speed and reliability.

Subscribe to Tech Blogs

Stay up to date on current developments in the Tech world related to Skills.

Basket

{{item.CourseTitle}}

Price: {{item.ItemPriceExVatFormatted}} {{item.Currency}}