From the course: Writing Secure Code for Android by Infosec
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Keys, tokens, and secrets
From the course: Writing Secure Code for Android by Infosec
Keys, tokens, and secrets
- Let's talk about keys, tokens, and secrets. Now, what are those? You've probably heard those terms before. A key is anything that can be reduced to a number. That's the secret part that we use as the variable in cryptography. Remember when we talked about encryption and we said that you need something that's not encrypted. We call it clear text, even if it's not text per se. You need a an algorithm, which is a mathematical formula, also known as a cipher. And then you need something that only you or authorized people know, and that is the key, that adds a randomness of variableness to the whole formula. Without a secret key then anybody can come along and read whatever you've created. So a key is anything that can be reduced to a number, which is ultimately how we use keys. We reduce it to some kind of number, and we then use it in the mathematical formula, which is what the cipher does. Token in this case, now token can mean a lot of things, but in our case we're talking about an…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Authentication, part 111m 34s
-
(Locked)
Authentication, part 211m 3s
-
(Locked)
Activity: Implementing a password checker, part 114m 53s
-
(Locked)
Activity: Implementing a password checker, part 215m 3s
-
(Locked)
Google sign-in5m 50s
-
(Locked)
Activity: Signing in with Google and Facebook7m 48s
-
(Locked)
Keys, tokens, and secrets6m 55s
-
(Locked)
Biometrics9m 30s
-
(Locked)
Activity: Implementing biometrics12m 13s
-
(Locked)
Two-factor authentication12m 5s
-
(Locked)
Authorization, part 111m 48s
-
(Locked)
Authorization, part 25m 40s
-
(Locked)
Authorization, part 35m 40s
-
(Locked)
Activity: Implementing runtime permissions6m 35s
-
(Locked)
Activity: Role-based access control14m 39s
-
(Locked)
OAuth8m 52s
-
(Locked)
Insecure direct object reference5m 37s
-
(Locked)
Session management, part 111m 41s
-
(Locked)
Session management, part 24m 10s
-
(Locked)
Activity: Implementing session management11m 21s
-
(Locked)
-
-