Cryptography in Cyber Secuirity | Types of Cryptography




 



Understand Cryptography Concepts

  • Cryptography enables one to secure transactions, communications and other processes performed in the electronic world

  • Cryptography is the conversion of data into a scrambled code that is encrypted and sent across a private or public network

  • Cryptography is used to protect confidential data, such as
    • email messages
    • chat sessions
    • web transactions
    • personal data
    • corporate data
    • e-commerce applications

Objectives of Cryptography

  • Confidentiality
  • Authentication
  • Integrity
  • Nonrepudiation

Types of Cryptography

  • Symmetric Encryption
    • Symmetric Encryption (secret-key, shared-key, and private-key) : uses the same key for encryption as it does for decryption
    • Plain Text : Encryption (Secret Key) : Cipher Text : Decryption (Secret Key) : Plain Text

  • Asymmetric Encryption
    • Asymmetric Encryption (public-key) : uses different encryption keys which are called public and private keys for encryption and decryption, respectively
    • Plain Text : Encryption Key (Public Key) : Cipher Text : Decryption (Private Key) : Plain Text

Encryption Algorithm

  • Encryption is the process of converting readable plaintext into an unreadable ciphertext using a set of complex algorithms
    • that transforms the data into blocks or streams of random alphanumeric characters
  • These Encryption Algorithms are :
    • DES
    • AES
    • DSA
    • RSA
    • MD5
    • SHA
    • RC4
    • RC5
  • CIPHER :
    • an algorithm (a series of well-defined steps) for performing encryption and decryption
    • Encipherment is the process of converting plaintext into a cipher or code
    • Decipherment is the reverse process of Encipherment
    • Communication technologies (e.g. Internet, cell-phones) rely on cipher to maintain both security and privacy
    • Ciphers may be free for public use or private for licensed

Different Types of Cryptographic Attack

 

2 Types of attack : Active & Passive Attack

 

Snooping on data, eavesdropping is a simple example of ‘passive attacks’.

 

Passive attacks are not as harmful as they do not cause any altering or modification of data.

 

Active Attacks : cause data to be altered, system files to be modified, and are obviously much more harmful than ‘passive attacks’.

 

Some examples of Active Attacks :

  • Brute Force Attacks
  • Cipher-Only Attacks
  • Known-plaintext attack
  • Chosen-plaintext attack
  • Chosen-ciphertext attack
  • Differential cryptanalysis
  • Linear cryptanalysis
  • Side channel attacks
  • Replay attacks

Cryptography Tools :

 

MD5 and MD6 Hash Calculators

Hash Calculators for Mobile

  • Hash Tools → download from play store
  • Hash Droid → download from play store
  • MD5 Checker
  • Hash Checker
  • Hashr - Checksum & Hash Digest Calculator
  • Hash Calculator
  • Hash Calc

BCTextEncoder

AxCrypt

Microsoft Cryptography Tools

Concealer

SensiGaurd

Challenger

Cryptography Tools for Mobile :



Thanks for reading,
To your success
Aman yadav




#cryptographic #crypto #cryptonews #cryptocurrency #bitcoin #cryptogang #cryptography #cryptoevangelist #cryptostuff #cryptoworld #cryptotraders #cryptoart #cryptogames #cryptoamen #cryptowave #cryptoinvestor #cryptomeme #cryptohustle #cryptocurrencies #blockchain #cryptotrading #bitcoinprice #cryptoverse #cryptoglossary #cryptomarket #bestcoinlist #cryptoterm #cryptos #memetrade #bhfyp #love #amansays

Post a Comment

0 Comments