Cryptography Basics


 


Understand Cryptography Concepts

  • Cryptography enables one to secure transactions, communications and other processes performed in the electronic world
  • Cryptography is the conversion of data into a scrambled code that is encrypted and sent across a private or public network
  • Cryptography used to protect confidential data, such as
    • email messages
    • chat sessions
    • web transactions
    • personal data
    • corporate data
    • e-commerce applications

Objectives of Cryptography

  • Confidentiality
  • Authentication
  • Integrity
  • Nonrepudiation

Types of Cryptography

  • Symmetric Encryption
    • Symmetric Encryption (secret-key, shared-key and private-key) : uses the same key for encryption as it does for decryption
    • Plain Text : Encryption (Secret Key) : Cipher Text : Decryption (Secret Key) : Plain Text
  • Asymmetric Encryption
    • Asymmetric Encryption (public-key) : uses different encryption keys which are called public and private keys for encryption and decryption , respectively
    • Plain Text : Encryption Key (Public Key) : Cipher Text : Decryption (Private Key) : Plain Text

Encryption Algorithm

  • Encryption is the process of converting readable plaintext into an unreadable ciphertext using a set of complex algorithms
    • that transforms the data into blocks or streams of random alphanumeric characters
  • These Encryption Algorithm are :
    • DES
    • AES
    • DSA
    • RSA
    • MD5
    • SHA
    • RC4
    • RC5
  • CIPHER :
    • an algorithm (a series of well-defined steps) for performing encryption and decryption
    • Encipherment is the process of converting plaintext into a cipher or code
    • Decipherment is the reverse process of Encipherment
    • Communication technologies (e.g. Internet, cell-phones) rely on cipher to maintain both security and privacy
    • Ciphers may be free for public use or private for licensed

Different Types of Cryptographic Attack

 

2 Types of attack : Active & Passive Attack

 

Snooping on dataeavesdropping is simple examples of ‘passive attacks’.


Passive attacks are not as harmful as they do not cause any altering or modification of data.

 

Active Attacks : cause data to be altered, system files to be modified and are obviously much more harmful than ‘passive attacks’.

 

Some examples of Active Attacks :

  • Brute Force Attacks
  • Cipher-Only Attacks
  • Known-plaintext attack
  • Chosen-plaintext attack
  • Chosen-ciphertext attack
  • Differential cryptanalysis
  • Linear cryptanalysis
  • Side channel attacks
  • Replay attacks

Cryptography Tools :

MD5 and MD6 Hash Calculators

Hash Calculators for Mobile

  • Hash Tools → download from play store
  • Hash Droid → download from play store
  • MD5 Checker
  • Hash Checker
  • Hashr - Checksum & Hash Digest Calculator
  • Hash Calculator
  • Hash Calc

BCTextEncoder

AxCrypt

Microsoft Cryptography Tools

Concealer

SensiGaurd

Challenger

Cryptography Tools for Mobile :

Post a Comment

Previous Post Next Post