Search for notes by fellow students, in your own course and all over the country.

Browse our notes for titles which look like what you need, you can preview any of the notes via a sample of the contents. After you're happy these are the notes you're after simply pop them into your shopping cart.

My Basket

You have nothing in your shopping cart yet.

Title: Hacking
Description: It's a complete notes on Cryptogrraphy of Ethical Hacking

Document Preview

Extracts from the notes are below, to see the PDF you'll receive please use the links above


BRIEF INTRODUCTION TO CRYPTOGRAPHY
By PAGVAC
February 8, 2004

What will I learn from this file?







What cryptography is
How encryption and decryption works
Cryptography terms
Symmetric cryptography
Asymmetric cryptography
PGP

Brief Introduction to Cryptography
Cryptography is the art and science of keeping messages secure
...
Basically, the point of cryptography is to allow any user to keep his
data secure and not readable from not desired individuals
...
In order to
fully understand some cryptography-related terms, we are going to use the following
example
...

Suppose that the information you are sending him is quite sensitive and it is extremely
important to you that only your boss gets to read the message
...
This text file at this point is readable and
therefore unsecured
...
So now you need to
make the plaintext file unreadable
...
The cyphertext file cannot be read and it looks as a
sequence of non-sense characters
...

After you email the cyphertext file to you boss then he would decrypt it, which means
that he would convert it back to its plaintext form so he could read it
...


Plaintext

Figure 1

Encryption

Ciphertext

Decryption

Plaintext

Now you must be wondering why would only your boss decrypt your ciphertext file
and not someone else
...
In order for only a specific person to be able to decrypt a file a key
is used
...
Only the people who own the key can
open the door, and at the same time you keep you key hidden from other people so that no
intruders get into your house
...
This key is just a
sequence of characters such as “firebird” or “this is my key”
...

Key
Plaintext

Encryption

Key
Ciphertext

Decryption

Plaintext

Figure 2
The key you choose is really up to you, although you should know that the longer your
key is, the harder it will be for a cryptanalyst (a ciphertext breaker) to decrypt the file
...
There are all sorts of encryption algorithms out there, although this subject is
really outside the scope of this paper
...
In a symmetric algorithm the key used to encrypt and decrypt a certain
message is the same in both cases
...
The example discussed at the beginning of this paper uses a
symmetric algorithm to encrypt and decrypt the text file sent by email
...
If
anyone had access to the key, he could decrypt and encrypt the message with no problem
...
As you
can guess from the term “asymmetric” now each of the two parties have a different key
...
The first one
is used to encrypt the message, whereas the private key is used to decrypt it
...

However, the private key should only be known by whoever is supposed to decrypt the
message
...
We will
use your boss again
...
So you talk to him about asymmetric cryptography and he likes the concept
...
He uses this key to decrypt
messages that his employees send to him
...
Any of his employees will be
able to encrypt a message in order to send it to their boss, but only their boss will be able
to decrypt it and therefore be able to read the message, since only he knows the private
key
...
Which tool to choose is really up to you
...
You can find many different versions of PGP at
http://www
...
org/
...
PGP Desktop has mainly three parts: PGPkeys, PGPmail, and
PGPdisk
...

With PGPmail you can encrypt email messages
...
There are
also other secondary tasks you can perform with PGP Desktop such as securing your ICQ
communications, completely deleting files (Windows by itself does not truly delete files),
and create self-decrypting archives
Title: Hacking
Description: It's a complete notes on Cryptogrraphy of Ethical Hacking