Cybersecurity Study Session | Encryption Edition
Happy Sunday!! On this Cybersecurity self-learning path, and let me just say my brain is being fed!
Today’s focus:
👩🏾💻Reviewed the basics of encryption
👩🏾💻Learned the difference between symmetric and asymmetric encryption
👩🏾💻Took notes on key terms like AES, RSA, public key, private key
👩🏾💻Completed a mini quiz to test my understanding
Anyone else doing self-paced programs? Let’s hold each other accountable!
#blackgirlintech #cybersecurity #lemon8studying #lemon8challenge
Happy Sunday, fellow learners! Diving deep into cybersecurity has truly been an enriching experience, and this week's focus on encryption has been particularly eye-opening. While the basics are a great start, understanding the 'why' and 'how' behind these complex systems makes all the difference. After reviewing the fundamentals, I realized how crucial it is to grasp why we even need two main types of encryption: symmetric and asymmetric. Symmetric encryption, like AES (which I took notes on), is incredibly fast and efficient for encrypting large amounts of data. Think of it like a single key that both locks and unlocks a treasure chest; both sender and receiver need the exact same key. The challenge, of course, is securely sharing that secret key without anyone else getting their hands on it. This is where asymmetric encryption, such as RSA (another key term I studied), comes into play. Asymmetric encryption uses a pair of keys: a public key and a private key. Your public key can be freely shared with anyone – it's like an open mailbox where anyone can drop a letter. But only your private key, which you keep secret, can open that mailbox and read the letter. This clever design solves the key exchange problem. When you want to send a secure message, you use the recipient's public key to encrypt it. Only their corresponding private key can decrypt it. It also works the other way around for digital signatures, where you encrypt something with your private key, and others can verify it's from you using your public key, ensuring both authenticity and integrity – a concept that's vital for trust in digital communications. What's truly ingenious, and something I found super interesting during my study, is how these two methods are often combined in real-world applications. For instance, when you visit a secure website (HTTPS), your browser and the server first use asymmetric encryption (like RSA) to securely exchange a symmetric encryption key. Once that secret key is established, all subsequent data transfer uses the much faster symmetric encryption. This hybrid approach gives us the best of both worlds: the secure key exchange of asymmetric methods and the high-speed data encryption of symmetric methods. It might sound complicated, but the beauty is that for most users, these intricate processes happen seamlessly in the background. Software like PGP (Pretty Good Privacy), which I encountered in some advanced readings, exemplifies this. It handles all the complex key management, encryption, and digital signatures automatically, making secure communication accessible even for those without deep cryptographic knowledge. It’s all about protecting our data and ensuring our messages are both private and authentic. It's truly empowering to understand these layers of security, especially in today's digital landscape!


































































































