Cryptography Concepts
Types of Cryptography
- Symmetric Cryptography
- Asymmetric Cryptography / Public Key Cryptography
Government Access to Keys (GAK)
Encryption Algorithms
- Ciphers
- Substitution
- Polyalphabetic
- Keys
- Stream Cipher
- Block Cipher
- Data Encryption Standard (DES)
Advanced Encryption Standard (AES)
The DSA and Related Signature Schemes
RSA (Rivest Shamir Adleman)
Message Digest (One-way Hash) Functions
Message Digest Function: MD5
Secure Hashing Algorithm (SHA)
Secure Hash Algorithm 2 (SHA-2)
Hashed Message Authentication Code (HMAC)
SSH (Secure Shell)
Cryptography Tools
MD5 Hash Calculators
- HashCalc
- MD5 Calculator
- HashMyFiles
Hash Calculators for Mobile:
- MD5 Hash Calculator
- Hash Droid
- Hash Calculator
Cryptography Tool
- Advanced Encryption Package
- BCTextEncoder
- Secret Space Encryptor (mobile)
- CryptoSymm (mobile)
- Cipher Sender (mobile)
Public Key Infrastructure(PKI)
Email Encryption
SSL and TLS for Secure Communication
Disk Encryption
- Symantec Drive Encryption
- GiliSoft Full Disk Encryption
Cryptography Attacks
- Known Plaintext Attack
- Cipher-text Only Attack
- Chosen Plaintext Attack
- Chosen Cipher-text Attack
- Adaptive Chosen Cipher-text Attack
- Adaptive Chosen Plaintext Attack
- Rubber Hose Attack
Code Breaking Methodologies
The following are some effective techniques and methodologies:
- Brute Force
- One-Time Pad
- Frequency Analysis