Certified Ethical Hacker (CEH) : Cryptography

0
1123

Cryptography Concepts

Types of Cryptography

  • Symmetric Cryptography
  • Asymmetric Cryptography / Public Key Cryptography

Government Access to Keys (GAK)

Encryption Algorithms

  • Ciphers
  • Substitution
  • Polyalphabetic
  • Keys
  • Stream Cipher
  • Block Cipher
  • Data Encryption Standard (DES)

Advanced Encryption Standard (AES)

The DSA and Related Signature Schemes

RSA (Rivest Shamir Adleman)

Message Digest (One-way Hash) Functions

Message Digest Function: MD5

Secure Hashing Algorithm (SHA)

Secure Hash Algorithm 2 (SHA-2)

Hashed Message Authentication Code (HMAC)

SSH (Secure Shell)

Cryptography Tools

MD5 Hash Calculators

  • HashCalc
  • MD5 Calculator
  • HashMyFiles

Hash Calculators for Mobile:

  • MD5 Hash Calculator
  • Hash Droid
  • Hash Calculator

Cryptography Tool

  • Advanced Encryption Package
  • BCTextEncoder
  • Secret Space Encryptor (mobile)
  • CryptoSymm (mobile)
  • Cipher Sender (mobile)

Public Key Infrastructure(PKI)

Email Encryption

SSL and TLS for Secure Communication

Disk Encryption

  • Symantec Drive Encryption
  • GiliSoft Full Disk Encryption

Cryptography Attacks

  • Known Plaintext Attack
  • Cipher-text Only Attack
  • Chosen Plaintext Attack
  • Chosen Cipher-text Attack
  • Adaptive Chosen Cipher-text Attack
  • Adaptive Chosen Plaintext Attack
  • Rubber Hose Attack

Code Breaking Methodologies

The following are some effective techniques and methodologies:

  • Brute Force
  • One-Time Pad
  • Frequency Analysis

LEAVE A REPLY

Please enter your comment!
Please enter your name here