20 years: technology, cybersecurity & operations
Now you understand the basics of cryptography, you can learn how it is applied to email encryption. Join Ciarán Rooney in this video as he explains why it is needed, the different stages at which a mail can be intercepted and the standards used for email encryption today.
Now you understand the basics of cryptography, you can learn how it is applied to email encryption. Join Ciarán Rooney in this video as he explains why it is needed, the different stages at which a mail can be intercepted and the standards used for email encryption today.
Subscribe to watch
Access this and all of the content on our platform by signing up for a 14-day free trial.
10 mins 45 secs
An email is vulnerable at several different points along its journey. All organisations, irrespective of industry and size, use emails to exchange data and documents that may include financial information, customer contracts, employee information, and other forms of sensitive data. Cryptographic techniques can be used to ensure the safe transmission of an email. The longer a key is, the better security it provides for encrypting data and documents in various verticals such as banking, financial services, and healthcare. The length of a key must align with the algorithm that will use it, and most algorithms support a range of different key sizes.
Key learning objectives:
Understand the need for cryptography needed in modern email communications
Comprehend the significance of key length in encryption
Understand the 2 types of models used in modern email encryption
Understand the main encryption standards used irrespective of model type
Access this and all of the content on our platform by signing up for a 14-day free trial.
Encrypted email communications are not only an essential requirement for the security of data, but also mandatory as part of regulatory compliance for many organisations in verticals such as banking, financial services, payments, and healthcare where customer data cannot be allowed to fall into wrong hands.
These points can be grouped into 2 sections: When the email is on a server or client device (data at rest) ; sent between clients and servers (data in flight)
An encryption key is one most fundamental part of the encryption process. The longer a key is, the better security it provides. Encryption key length is specified as a logarithm in the form of bits. Symmetric key systems typically use a key length of between 128 bits and 256 bits. Asymmetric key systems use much larger key bit sizes (1,024, 2048 or 4096 bits) so not only do they reduce risk of sharing keys but also offer improved encryption security.
Main issues regarding the asymmetric method is encryption feasibility which depends on the key length and the computing power needed to encrypt and decrypt the information. There needs to be a trade off between computation power and key length. Symmetric is normally used for internal communications and asymmetric encryption for external.
Emails require end to end email encryption (covering both data at rest and data in flight). 2 types of models are commonly used:
Access this and all of the content on our platform by signing up for a 14-day free trial.
There are no available videos from "Ciaran Rooney"