< All Cryptography Notes

tsirhCdneM | Cryptography | Section 1

By: Raul Pop | Related Course: Cryptography | Published: June 14, 2017 | Modified: June 14, 2017
Join Cybrary

NotepadIntroduction to Cryptographic Tools

Unit objective

Explain how cryptography is used to protect confidentiality,integrity and authenticity(privacy/confidentiality,integrity,authenticity and non-repudiation) to prevent unauthorized disclosure

The greatest threat for confidentiality is social engineering.

Second threat is media reuse

Destroy the drive this is the best solution

 


NotepadKey Concepts of Cryptography

Cryptography

Concepts:

-keys

-principies(I,AC)

-substitution/transposition

-disk encryption

 

Integrity

Hashing

Message digests

MD5(128 bits)

SHA(160)

HASHING CALCULATOR

 

 

Asymmetric

DH

EI Gamal

RSA

Eliptical Curve

KNAPSACK( USE PRIVATE KEY)

DSA

 

PKI

CA

RA

X.509

IKE

ISAKMP

CRL

 

Symmetric

AES

DES

3DES

IDEA

CAST

2FISH

BLOWFISH

SERPENTS

RIJNDAEL

PGP

OTP

 

Protocols

SSH

HTTPS

IPSEC

SSL/TLS

 

ATTACKS

Known Plaintext

Known Ciphertext

Cosen Ciphertext

Chosen Plaintext

 


NotepadServices/Threats of Cryptography

1)Eavesdropping

-encryption is not enough because it doesnt matter if i cannot read the password all i need is to use it.(can catch,packets with your password)

Use Kerberos

Look for DNS where you are sending the credentials


< All Cryptography Notes
Join Cybrary

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel