Introduction to Cryptography | Ethical Hacking (2024)

Cryptography is the art of converting text into another form for secret transmission and reception. It works by converting plain text into cipher text using some encryption algorithm at the sender’s side and converting ciphertext into plain text at the receiver’s. Cryptography is used to provide confidentiality, integrity, authenticity and non-repudiation.

Key terms:

Plain text: Message to be encrypted

Ciphertext: Encrypted message

Encryption: Process of converting plain text into cipher text.

Decryption: Process of converting ciphertext into plain text.

Algorithm: The method used to encrypt/decrypt the plain text.

Key: The data used for encrypting/decrypting.

There are various cryptographic algorithms present, generally we categorise them as follows-

Symmetric cryptography:

Here one single key is used for encryption and same key is used for decryption. DES and AES are examples of symmetric key cryptography.

Introduction to Cryptography | Ethical Hacking (1)
Image Source: http://www.jayitsecurity.com

Asymmetric cryptography/Public key cryptography:

Here two keys are used, Public key is used for encryption and Private key is used for decryption; e.g. RSA.

Introduction to Cryptography | Ethical Hacking (2)

Block Cipher:

The input plain text is broken into fixed size blocks and they are encrypted /decrypted as a block; e.g. DES, AES.

Stream cipher:

The incoming data is encrypted or decrypted byte by byte; e.g. RC4.

Introduction to Cryptography | Ethical Hacking (3)
Image Source: https://www.tutorialspoint.com/cryptography/modern_symmetric_key_encryption.htm

Digital Signatures:

Digital signatures are used to identify the genuinity of the source; the sender signs with his private key, and at the receiver’s end it can be decrypted only with the public key of the sender. This enables the receiver to know who has sent the message.

Hash Algorithms:

Hash algorithms are used to maintain the integrity of the data by finding a definite number for the file and verifying it at the receiver’s end.

Introduction to Cryptography | Ethical Hacking (4)
Image Source: https://www.tutorialspoint.com/cryptography/cryptography_hash_functions.htm

At the sender’s side, the hash algorithm generates a fixed size number for any-sized file. This number or hash value is sent along with the cipher text to the receiver. At the receiver’s end, the cipher text is first decrypted, and then using hash algorithm a hash value is generated. If the hash value matches with the hash value that came with the cipher text, then the message was not corrupted. If it is different, then we can understand that the message has been intercepted and modified.

There are various hash algorithms

SHA1, SHA 256 , MD5, etc.

Introduction to Cryptography | Ethical Hacking (2024)
Top Articles
Conversion Rate: What it Means, Examples
Foreign Currency & Currency Exchange Rates: What to Use
Craigslist St. Paul
Pixel Speedrun Unblocked 76
Dricxzyoki
T Mobile Rival Crossword Clue
Lenscrafters Westchester Mall
Western Razor David Angelo Net Worth
United Dual Complete Providers
Swimgs Yung Wong Travels Sophie Koch Hits 3 Tabs Winnie The Pooh Halloween Bob The Builder Christmas Springs Cow Dog Pig Hollywood Studios Beach House Flying Fun Hot Air Balloons, Riding Lessons And Bikes Pack Both Up Away The Alpha Baa Baa Twinkle
Ncaaf Reference
Knaben Pirate Download
Thotsbook Com
Echo & the Bunnymen - Lips Like Sugar Lyrics
Roster Resource Orioles
Copart Atlanta South Ga
Ruben van Bommel: diepgang en doelgerichtheid als wapens, maar (nog) te weinig rendement
China’s UberEats - Meituan Dianping, Abandons Bike Sharing And Ride Hailing - Digital Crew
Finalize Teams Yahoo Fantasy Football
Cbssports Rankings
Busted Mcpherson Newspaper
Little Rock Skipthegames
Greenville Sc Greyhound
The Many Faces of the Craigslist Killer
Wnem Tv5 Obituaries
Colonial Executive Park - CRE Consultants
Lbrands Login Aces
27 Fantastic Things to do in Lynchburg, Virginia - Happy To Be Virginia
Pokémon Unbound Starters
Rs3 Bring Leela To The Tomb
Kristy Ann Spillane
Astro Seek Asteroid Chart
Cvs Sport Physicals
Best Restaurants Ventnor
Darktide Terrifying Barrage
Rush County Busted Newspaper
Redbox Walmart Near Me
Maybe Meant To Be Chapter 43
The Mad Merchant Wow
KITCHENAID Tilt-Head Stand Mixer Set 4.8L (Blue) + Balmuda The Pot (White) 5KSM175PSEIC | 31.33% Off | Central Online
Dr. John Mathews Jr., MD – Fairfax, VA | Internal Medicine on Doximity
Labyrinth enchantment | PoE Wiki
Tiny Pains When Giving Blood Nyt Crossword
Pay Entergy Bill
Stosh's Kolaches Photos
Enr 2100
Minterns German Shepherds
Wwba Baseball
Diablo Spawns Blox Fruits
Convert Celsius to Kelvin
Gameplay Clarkston
Loss Payee And Lienholder Addresses And Contact Information Updated Daily Free List Bank Of America
Latest Posts
Article information

Author: Sen. Ignacio Ratke

Last Updated:

Views: 5682

Rating: 4.6 / 5 (56 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Sen. Ignacio Ratke

Birthday: 1999-05-27

Address: Apt. 171 8116 Bailey Via, Roberthaven, GA 58289

Phone: +2585395768220

Job: Lead Liaison

Hobby: Lockpicking, LARPing, Lego building, Lapidary, Macrame, Book restoration, Bodybuilding

Introduction: My name is Sen. Ignacio Ratke, I am a adventurous, zealous, outstanding, agreeable, precious, excited, gifted person who loves writing and wants to share my knowledge and understanding with you.