New     Submit     Search     Register  

Advanced Encryption Strategies for Beginners

Customers often have advanced use cases for encryption, like encrypting to multiple recipients, or caching data keys. These can be challenging to get right if you're trying to implement it yourself. The good news is, AWS has released open source tools that make all of that relatively easy. In this episode we'll talk about encryption use cases and the best tools to solve them.

Updated on April 22
0:00
0:00

Key Smash Notes In This Episode

0

To encrypt information is to make sure that you keep that information confidential, and that integrity of this information remains when encryption is removed.

In other words, encryption enables you to share something in secret, and whoever gets that secret and is able to open it, will be able to verify its authenticity, that indeed it was created by you.

1

Symmetric encryption uses the same key to encrypt and to decrypt data, whereas asymmetric uses a key pair, where one is public and another is private key; one is used for encryption as one is used for decryption.

Although asymmetric encryption tends to be quite a bit slower in terms of processor needs, it is often preferred for security.

Suggested Episodes