From the course: CompTIA Security+ (SY0-701) Cert Prep
Elliptic-curve and quantum cryptography
From the course: CompTIA Security+ (SY0-701) Cert Prep
Elliptic-curve and quantum cryptography
- [Narrator] Let's take a look at two more encryption technologies that are covered on the exam, but they're a little less commonly used, elliptic curve cryptography and quantum cryptography. All public key cryptography is based upon the difficulty of solving complex mathematical problems. In the case of the RSA algorithm, the security of the algorithm depends upon the difficulty of factoring the product of two large prime numbers. You might recall from a math class that prime numbers are those that are divisible only by themselves and the number one. Common examples of prime numbers include 2, 3, 5, 7 and 11. Now, if I told you that I was going to multiply two prime numbers together and provide you with the answer, you might think that you'd be able to perform that calculation. For example, if I tell you that 15 is the product of two prime numbers, you can easily determine that those numbers are three and five. Or if I asked you to perform the prime factorization of 21, you'd quickly figure out that the two prime numbers are three and seven. RSA and other cryptographic algorithms that depend upon the difficulty of factoring prime numbers, use much larger prime numbers however. What if I showed you this product and asked you to identify the two prime numbers that went into it? Now, that's a little more difficult, isn't it? Currently, there is no effective way to solve the prime factorization problem efficiently for large numbers. If someone discovered an efficient way to do this, all of the cryptographic algorithms that depend upon prime factorization would immediately become insecure. Elliptic curve cryptography, or ECC, does not depend upon the prime factorization problem. It uses a completely different problem, known as the elliptic curve discreet logarithm problem. Now, explaining that problem is a lot more difficult than the prime factorization problem, but fortunately, you won't need to understand how ECC works on the exam, just to remember that it uses a different approach than the prime factorization problem. Quantum computing is an emerging field that attempts to use quantum mechanics to perform computing tasks. It's still mostly a theoretical field, but if it advances to the point where that theory becomes practical to implement, quantum cryptography may be able to defeat cryptographic algorithms that depend upon factoring large prime numbers. Unfortunately, the use of elliptic curve cryptography would not provide protection against quantum attacks. Elliptic curve approaches are even more susceptible to quantum attack than prime factorization algorithms. At the same time, quantum computing may be used to develop even stronger cryptographic algorithms that would be far more secure than modern approaches. We'll have to wait and see how those develop to provide us with strong quantum communications in a post quantum era.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
The goals of information security2m 11s
-
Authentication, authorization, and accounting (AAA)3m 31s
-
Categorizing security controls5m 11s
-
Conducting a gap analysis2m 34s
-
Zero Trust5m 32s
-
Physical access control4m 40s
-
Physical security personnel2m 12s
-
Deception technologies2m 55s
-
Change management6m 2s
-
-
-
Trust models2m 52s
-
PKI and digital certificates4m 5s
-
Hash functions7m 38s
-
Digital signatures3m 50s
-
Digital signature standard1m 27s
-
Create a digital certificate4m 55s
-
Revoke a digital certificate1m 28s
-
Certificate stapling2m 29s
-
Certificate authorities6m 13s
-
Certificate subjects3m 35s
-
Certificate types2m 55s
-
Certificate formats2m 30s
-
-
-
Preventing SQL injection4m 25s
-
Understanding cross-site scripting3m 17s
-
Request forgery4m 8s
-
Overflow attacks3m 21s
-
Explaining cookies and attachments4m 7s
-
Session hijacking4m 8s
-
Code execution attacks2m 43s
-
Privilege escalation1m 56s
-
OWASP Top Ten4m 45s
-
Application security4m 3s
-
Defending against directory traversal3m 4s
-
Race condition vulnerabilities2m 13s
-
-
-
Restricting network access2m 8s
-
Network access control4m 30s
-
Router configuration security4m 5s
-
Switch configuration security3m 42s
-
Maintaining network availability2m 32s
-
Network monitoring3m 41s
-
SNMP2m 54s
-
Isolating sensitive systems2m
-
Zero trust networking4m 9s
-
Secure access service edge (SASE)3m 50s
-
-
-
Operating system security8m 44s
-
Malware prevention7m 25s
-
Application management3m 46s
-
Host-based network security controls7m 44s
-
File integrity monitoring4m 9s
-
Data loss prevention5m 17s
-
Data encryption5m 39s
-
Hardware and firmware security5m 24s
-
Linux file permissions4m 2s
-
Web content filtering1m 47s
-
-
-
What is vulnerability management?5m 2s
-
Identify scan targets4m 24s
-
Scan configuration5m 20s
-
Scan perspective4m 24s
-
Security Content Automation Protocol (SCAP)2m 27s
-
Common Vulnerability Scoring System (CVSS )3m 31s
-
Analyzing scan reports4m 37s
-
Correlating scan results2m 20s
-
Vulnerability response and remediation2m 14s
-
-
-
Authentication factors3m 26s
-
Multifactor authentication2m 17s
-
Something you have4m 24s
-
Password policy4m 19s
-
Password managers2m 3s
-
Passwordless authentication3m 23s
-
Single sign-on and federation3m 9s
-
Kerberos and LDAP5m 18s
-
SAML2m 35s
-
OAUTH and OpenID Connect2m 55s
-
Certificate-based authentication5m 25s
-