From the course: Certified Information Systems Auditor (CISA) Cert Prep

Unlock this course with a free trial

Join today to access over 24,200 courses taught by industry experts.

Symmetric cryptography

Symmetric cryptography

- [Narrator] So when we talk about cryptography, before we get too much further, I think it's important to understand that when we're performing encryption processes, there are usually a couple of elements that we have. We generally have an algorithm, well, we do, we have an algorithm and we generally have a key. So the algorithm is the math that's to be performed. 'Cause, ultimately, with crypto, we're taking plain text, which ultimately comes down to ones and zeros. We're using some sort of mathematical process. And the instruction on how to use that mathematical process is, you know, is contained in the key. So when we're encrypting, often, we think about having the math and the instructions on how to use the math. We have an algorithm and we have a key. Now, the thing about this is if I'm going to encrypt data, you have to have the capability to decrypt data, right? So we have to agree upon the algorithm, and then we've got to figure out this idea of the key and how we're going to…

Contents