Skip to player
Skip to main content
Search
Connect
Watch fullscreen
Like
Bookmark
Share
More
Add to Playlist
Report
35. Encryption Basics - Oracle Cloud Infrastructure Foundations
Psycho Killer
Follow
3 days ago
Category
🤖
Tech
Transcript
Display full video transcript
00:00
welcome to this lesson on encryption basics in this particular lesson we are going to look at
00:09
what encryption is what different kinds of encryption algorithms exist what does it mean
00:14
to have symmetric encryption versus asymmetric encryption etc so let's start with the basics
00:19
first encryption is used to transform plain text data into cipher text what does cipher text mean
00:28
or cipher text is also referred to as encrypted text basically what it means it's a series of
00:34
randomized letters and numbers which humans cannot make any sense of plain text you can make sense
00:40
once it's encrypted cipher text you cannot make sense of that just by looking at it decryption
00:46
which is the reverse process is used to transform this cipher text into plain text so plain text
00:52
you take and then you encrypt it into cipher text that's encryption and the reverse process is
00:58
decryption now you also hear this term called key a key is a piece of information you usually a string
01:05
of numbers or letters that are stored in a file which when processed through a cryptographic algorithm
01:11
and we'll look at what these algorithms look like can encrypt or decrypt data so this is the central
01:17
piece you need in order to encrypt or decrypt any kind of data now you also hear of this term called
01:24
key or key pair encryption key or key pair is generated for a specific algorithm that can be
01:30
used for encryption or you also hear this term called digital signing so how does this work if you
01:35
have to look at it visually well encryption you take the plain text data and you use the key which is
01:42
generated for a specific algorithm so that's what you see here the key with a specific algorithm here
01:48
and that converts into a cipher text which is a series of randomized letters and numbers which if
01:54
a hacker gets access to or human gets access to they cannot make sense of and the reverse process
02:00
is called decryption you take this randomized series of series of randomized letters and numbers
02:07
you use the key again which is tied to an algorithm and then you can get the plain text back right so this
02:13
is basically how encryption works encryption or decryption now you also hear of this term called
02:19
encryption at rest and encryption in transit what this means is data at rest is the data that is stored
02:26
on a physical device such as a server as you can see here it may be stored in a database or a storage
02:31
account but regardless of where it is stored encryption of data at rest ensures that the data is unreadable
02:39
without the keys needed to decrypt it so if an attacker obtained a hard drive with encrypted data
02:45
and didn't have access to the encryption keys they would be unable to read that data so that's basically
02:51
what it means by encryption at rest encryption in transit is basically data moving from one location
02:57
to another such as across the internet or through a private network so how this this thing works is
03:04
you can see the data is moving here right so from the client it goes let's say to the server
03:09
and you can do in transit encryption so that the data is is secure so sttps is an example of
03:16
encryption uh in transit encrypting data in transit basically protects it from outside
03:21
attackers and provides a mechanism to transmit data while limiting the risk of exposure so so know the
03:28
difference between encryption for data at rest and encryption for data in transit now let's look at
03:35
a couple of uh types of uh encryption one called symmetric one called asymmetric now symmetric key
03:41
cryptography is where a single key is used for encryption and decryption right so if you look
03:47
there are two actors here john and mike and john is has a message let's say as simple as hello mike and he
03:55
wants to encrypt it he makes use of this secret key and you can see this series of randomized numbers and
04:02
letters this is the ciphertext he encrypts this uh message and then he sends it over to mike now mike
04:08
also has access to the secret key and he takes that and he uses that to decrypt this message and gets
04:15
the original plain text message which is hello mike now as you can guess one of the issues with this
04:21
uh kind of encryption is uh everyone has access to the same key right uh and there are ways to solve
04:27
around that this is just the basics kind of encryption basics lesson so we're not getting into that but
04:32
as you can see the idea is both john and mike two parties here they share the same key both for
04:38
encryption and decryption now contrary to this there's another algorithm which is called asymmetric
04:45
encryption now asymmetric encryption is where different keys are used for encryption and decryption
04:51
so as you can see here uh there are two parties again john and mike
04:54
and let's say mike has generated a key pair which has a public key component and a private key
05:02
component as shown here on the slide so each pair consists of a public key which may be known to
05:08
others and a private key which may not be known to anyone except the owner so you can see that mike
05:15
only has the private key here so what happens in asymmetric encryption is anyone can encrypt messages
05:22
using a public key so you see john here uh because public key is public so he takes this and encrypts
05:30
the the message but only the holder of the paired this this pair here uh private key can decrypt
05:37
uh a message because only mike has this key pair here so he can decrypt the message if an attacker gets
05:44
hold of uh this this public key and even this message because different keys are used for encryption and
05:49
decryption they cannot make sense of this ciphertext right so the security of this system depends on the
05:56
secrecy of the private key which must not become known to any other uh party here right so it should
06:03
only be with mike because he generated the public and private key in the in the first place so this
06:07
is what asymmetric encryption is now let's look at some other uh we looked at encryption what it is
06:14
transform plaintext into ciphertext decryption is kind of reverse of that and key pair is generated or
06:19
key generated for a specific algorithm to be used for encryption or digital signing now you also hear
06:25
these algorithms called aes advanced encryption standard where the same key encrypts and decrypts
06:32
data now aes is pretty advanced and it's very robust but the issue around here as you can imagine is
06:40
is using the same key for both encryption and decryption rsa on the other hand uh is where a public key
06:47
encrypts and private key decrypts the data so it has uh that kind of built-in but there has been
06:55
discussion on whether to use aes or rsa both have their own advantages one thing with aes is it's a
07:02
symmetric algorithm absolutely but it uses the same 128 192 or 256 a bit key for both encryption and
07:10
decryption uh and so rsa on the other hand is uh computationally more intensive and it's a bit
07:18
slower and there are cases where people use both together and again this is basic so we're not
07:23
getting into all these details ecdsa stands for elliptic curve digital signature algorithm it's one of the
07:31
more complex public key cryptography encryption algorithms is generated by elliptic curve cryptography
07:37
that are smaller than the average keys generated by digital signing algorithm so again basics we don't
07:43
have to go into that but as you can imagine we we just talked about it it's used for digital signing
07:49
it's not used for encryption and decryption of data so that was just a quick primer on encryption basics
07:58
looking at kind of the different algorithms and looking at symmetric versus asymmetric encryption
08:04
another term which you hear a lot or you would hear in the subsequent lesson is this thing called hardware
08:09
security module think about hardware security module or hsm as a physical computing device that safeguards
08:16
and manages keys it performs encryption and decryption functions also does things like strong
08:21
authentication and other cryptographic functions now there are certain characteristics of these hsm
08:28
they are tamper evident as we discussed you know they are used to manage these digital keys and also
08:34
perform cryptographic functions now because the critical role they play in securing applications and
08:41
infrastructure hsms are typically certified to internationally recognized standards such as common
08:49
criteria or fips 140 to provide users with independent assurance that the design and implementation of the
08:56
product and cryptographic algorithms are sound so in case of um oci oracle cloud infrastructure we have
09:03
a service called vault it uses hsm behind the scenes and the hsms it uses meet the fibs 140 dash uh
09:13
two security level three uh certification i think believe the highest level goes to four so three is actually
09:20
pretty pretty nice kind of standard and it has um certain characteristics of obviously it's tamper
09:27
resistant uh it requires uh kind of identity based authentication and if somebody tries to tamper with
09:34
the device if they get hold of the device the hsm deletes the key uh when it detects tampering so it
09:40
manages that sort of the superior level of security and independent assurance that it meets certain criteria
09:47
certain regulatory compliance standards so hopefully this was a quick lesson we looked at encryption
09:54
basics kind of some difference between symmetric asymmetric uh encryption looked at some of the
09:59
algorithms and we concluded with a quick overview of what hardware security modules are i hope you
10:06
found this lesson useful thanks for your time
Be the first to comment
Add your comment
Recommended
3:45
|
Up next
43. Support Rewards - Oracle Cloud Infrastructure Foundations
Psycho Killer
3 days ago
5:34
42. Tagging - Oracle Cloud Infrastructure Foundations
Psycho Killer
3 days ago
6:52
41. Demo: Cloud Advisor - Oracle Cloud Infrastructure Foundations
Psycho Killer
3 days ago
8:06
40. Demo: Cost Management - Oracle Cloud Infrastructure Foundations
Psycho Killer
3 days ago
3:25
39. Cost Management - Oracle Cloud Infrastructure Foundations
Psycho Killer
3 days ago
4:41
38. Pricing - Oracle Cloud Infrastructure Foundations
Psycho Killer
3 days ago
6:38
37. Demo Vault - Oracle Cloud Infrastructure Foundations
Psycho Killer
3 days ago
7:49
36. Vault - Oracle Cloud Infrastructure Foundations
Psycho Killer
3 days ago
5:48
34. Demo: Security Zone and Security Advisor - Oracle Cloud Infrastructure Foundations
Psycho Killer
3 days ago
3:41
33. Security Zones and Security Advisor - Oracle Cloud Infrastructure Foundations
Psycho Killer
3 days ago
8:04
31. Security Introduction - Oracle Cloud Infrastructure Foundations
Psycho Killer
3 days ago
4:20
32. Cloud Guard - Oracle Cloud Infrastructure Foundations
Psycho Killer
3 days ago
8:17
29. Demo: Block Volume - Oracle Cloud Infrastructure Foundations
Psycho Killer
4 days ago
3:31
30. File Storage - Oracle Cloud Infrastructure Foundations
Psycho Killer
4 days ago
4:19
28. Block Volume - Oracle Cloud Infrastructure Foundations
Psycho Killer
4 days ago
5:15
27. Demo: Object Storage - Oracle Cloud Infrastructure Foundations
Psycho Killer
4 days ago
7:10
26. Object Storage - Oracle Cloud Infrastructure Foundations
Psycho Killer
4 days ago
4:56
25. Storage Introduction - Oracle Cloud Infrastructure Foundations
Psycho Killer
4 days ago
4:58
24. Serverless with Oracle Functions - Oracle Cloud Infrastructure Foundations
Psycho Killer
4 days ago
2:29
23. Container workloads in OCI - Oracle Cloud Infrastructure Foundations
Psycho Killer
4 days ago
9:28
22. Oracle Container Engine for Kubernetes (OKE) - Oracle Cloud Infrastructure Foundations
Psycho Killer
4 days ago
4:24
21. Scaling - Oracle Cloud Infrastructure Foundations
Psycho Killer
4 days ago
11:42
20. Demo: Creating a Compute Instance - Oracle Cloud Infrastructure Foundations
Psycho Killer
4 days ago
2:49
19. Demo: Getting Started with Cloud Shell - Oracle Cloud Infrastructure Foundations
Psycho Killer
4 days ago
3:46
18. Instance Basics - Oracle Cloud Infrastructure Foundations
Psycho Killer
4 days ago
Be the first to comment