Understand Cryptography Concepts
- Cryptography enables one to secure transactions, communications and other processes performed in the electronic world
- Cryptography is the conversion of data into a scrambled code that is encrypted and sent across a private or public network
- Cryptography used to protect confidential data, such as
- email messages
- chat sessions
- web transactions
- personal data
- corporate data
- e-commerce applications
Objectives of Cryptography
- Confidentiality
- Authentication
- Integrity
- Nonrepudiation
Types of Cryptography
- Symmetric Encryption
- Symmetric Encryption (secret-key, shared-key and private-key) : uses the same key for encryption as it does for decryption
- Plain Text : Encryption (Secret Key) : Cipher Text : Decryption (Secret Key) : Plain Text
- Asymmetric Encryption
- Asymmetric Encryption (public-key) : uses different encryption keys which are called public and private keys for encryption and decryption , respectively
- Plain Text : Encryption Key (Public Key) : Cipher Text : Decryption (Private Key) : Plain Text
Encryption Algorithm
- Encryption is the process of converting readable plaintext into an unreadable ciphertext using a set of complex algorithms
- that transforms the data into blocks or streams of random alphanumeric characters
- These Encryption Algorithm are :
- DES
- AES
- DSA
- RSA
- MD5
- SHA
- RC4
- RC5
- CIPHER :
- an algorithm (a series of well-defined steps) for performing encryption and decryption
- Encipherment is the process of converting plaintext into a cipher or code
- Decipherment is the reverse process of Encipherment
- Communication technologies (e.g. Internet, cell-phones) rely on cipher to maintain both security and privacy
- Ciphers may be free for public use or private for licensed
Different Types of Cryptographic Attack
2 Types of attack : Active & Passive Attack
Snooping on data, eavesdropping is simple examples of ‘passive attacks’.
Passive attacks are not as harmful as they do not cause any altering or modification of data.
Active Attacks : cause data to be altered, system files to be modified and are obviously much more harmful than ‘passive attacks’.
Some examples of Active Attacks :
- Brute Force Attacks
- Cipher-Only Attacks
- Known-plaintext attack
- Chosen-plaintext attack
- Chosen-ciphertext attack
- Differential cryptanalysis
- Linear cryptanalysis
- Side channel attacks
- Replay attacks
Cryptography Tools :
MD5 and MD6 Hash Calculators
- MD5 Calculator
- HashMyFiles
- MD6 Hash Generator
- All Hash Generator
- https:// browserling.com
- md5 hash calculator
- HashCalc
Hash Calculators for Mobile
- Hash Tools → download from play store
- Hash Droid → download from play store
- MD5 Checker
- Hash Checker
- Hashr - Checksum & Hash Digest Calculator
- Hash Calculator
- Hash Calc
BCTextEncoder
AxCrypt
Microsoft Cryptography Tools
Concealer
SensiGaurd
Challenger
Cryptography Tools for Mobile :
- Secret Space Encryptor
- Secure Everything
- play store
Tags
SPEED READING