Understand Cryptography Concepts
- Cryptography enables one to secure transactions, communications and other processes performed in the electronic world
- Cryptography is the conversion of data into a scrambled code that is encrypted and sent across a private or public network
- Cryptography is used to protect confidential data, such as
- email messages
- chat sessions
- web transactions
- personal data
- corporate data
- e-commerce applications
Objectives of Cryptography
- Confidentiality
- Authentication
- Integrity
- Nonrepudiation
Types of Cryptography
- Symmetric Encryption
- Symmetric Encryption (secret-key, shared-key, and private-key) : uses the same key for encryption as it does for decryption
- Plain Text : Encryption (Secret Key) : Cipher Text : Decryption (Secret Key) : Plain Text
- Asymmetric Encryption
- Asymmetric Encryption (public-key) : uses different encryption keys which are called public and private keys for encryption and decryption, respectively
- Plain Text : Encryption Key (Public Key) : Cipher Text : Decryption (Private Key) : Plain Text
Encryption Algorithm
- Encryption is the process of converting readable plaintext into an unreadable ciphertext using a set of complex algorithms
- that transforms the data into blocks or streams of random alphanumeric characters
- These Encryption Algorithms are :
- DES
- AES
- DSA
- RSA
- MD5
- SHA
- RC4
- RC5
- CIPHER :
- an algorithm (a series of well-defined steps) for performing encryption and decryption
- Encipherment is the process of converting plaintext into a cipher or code
- Decipherment is the reverse process of Encipherment
- Communication technologies (e.g. Internet, cell-phones) rely on cipher to maintain both security and privacy
- Ciphers may be free for public use or private for licensed
Different Types of Cryptographic Attack
2 Types of attack : Active & Passive Attack
Snooping on data, eavesdropping is a simple example of ‘passive attacks’.
Passive attacks are not as harmful as they do not cause any altering or modification of data.
Active Attacks : cause data to be altered, system files to be modified, and are obviously much more harmful than ‘passive attacks’.
Some examples of Active Attacks :
- Brute Force Attacks
- Cipher-Only Attacks
- Known-plaintext attack
- Chosen-plaintext attack
- Chosen-ciphertext attack
- Differential cryptanalysis
- Linear cryptanalysis
- Side channel attacks
- Replay attacks
Cryptography Tools :
MD5 and MD6 Hash Calculators
- MD5 Calculator
- HashMyFiles
- MD6 Hash Generator
- All Hash Generator
- https:// browserling.com
- md5 hash calculator
- HashCalc
Hash Calculators for Mobile
- Hash Tools → download from play store
- Hash Droid → download from play store
- MD5 Checker
- Hash Checker
- Hashr - Checksum & Hash Digest Calculator
- Hash Calculator
- Hash Calc
BCTextEncoder
AxCrypt
Microsoft Cryptography Tools
Concealer
SensiGaurd
Challenger
Cryptography Tools for Mobile :
- Secret Space Encryptor
- Secure Everything
- play store
0 Comments