Sunday, December 21, 2014

Introduction to security and ethical hacking-part 4 In this session,we will learn about cryptographic fundamentals

 

Introduction to security and ethical hacking-part 4 In this session,we will learn about cryptographic fundamentals ... ------------------------------------------------------------------------------------- CRYPTOGRAPHIC FUNDAMENTALS:- cryptography is the science of hiding or encrypting information.The practice of cryptography is very old and has been evolving since ancient times.cryptography is a powerful and complex mechanism to maintain computer security.Modern communications and computing use cryptography extensively to protect sensitive information and communications from unauthorized access. There are many cryptographic techniques that can accomplish the goals of the CIA triad.Encryption is a cryptographic technique that converts data from plain or cleartext form,into coded or π—°π—Άπ—½π—΅π—²π—Ώπ˜π—²π˜…π˜ 𝗳𝗼𝗿𝗺(meaning mentioned below).only authorized recipients with the necessary decryption information can decode and read the data. π—°π—Άπ—½π—΅π—²π—Ώπ˜π—²π˜…π˜:π’œ 𝒸𝒾𝓅𝒽ℯ𝓇 π’Ύπ“ˆ 𝒢 π“ˆπ“…β„―π’Έπ’Ύπ’»π’Ύπ’Έ π“ˆβ„―π“‰ ℴ𝒻 π’Άπ’Έπ“‰π’Ύβ„΄π“ƒπ“ˆ π“Šπ“ˆβ„―π’Ή 𝓉ℴ β„―π“ƒπ’Έπ“‡π“Žπ“…π“‰ 𝒹𝒢𝓉𝒢.𝒫𝓁𝒢𝒾𝓃𝓉ℯ𝓍𝓉 π’Ύπ“ˆ 𝓉𝒽ℯ β„΄π“‡π’Ύβ„Šπ’Ύπ“ƒπ’Άπ“,π“Šπ“ƒ-ℯ𝓃𝒸ℴ𝒹ℯ𝒹 𝒹𝒢𝓉𝒢.π’ͺ𝓃𝒸ℯ 𝓉𝒽ℯ 𝒸𝒾𝓅𝒽ℯ𝓇 π’Ύπ“ˆ 𝒢𝓅𝓅𝓁𝒾ℯ𝒹 𝓉ℴ 𝓉𝒽ℯ 𝓅𝓁𝒢𝒾𝓃𝓉ℯ𝓍𝓉,𝓉𝒽ℯ β„΄π’·π“ˆπ“Šπ“‡β„―π’Ή 𝒹𝒢𝓉𝒢 π’Ύπ“ˆ π“€π“ƒβ„΄π“Œ π’Άπ“ˆ π’žβ„π’«β„‹β„°β„› 𝒯ℰ𝒳𝒯.𝒯𝒽ℯ π“‡β„―π“‹β„―π“‡π“ˆβ„― π“…π“‡β„΄π’Έβ„―π“ˆπ“ˆ ℴ𝒻 π“‰π“‡π’Άπ“ƒπ“ˆπ“π’Άπ“‰π’Ύπ“ƒβ„Š 𝒸𝒾𝓅𝒽ℯ𝓇 𝓉ℯ𝓍𝓉 𝓉ℴ 𝒸𝓁ℯ𝒢𝓇 𝓉ℯ𝓍𝓉 π’Ύπ“ˆ π“€π“ƒβ„΄π“Œ π’Άπ“ˆ π’Ήβ„―π’Έπ’Ύπ“…π’½β„―π“‡π’Ύπ“ƒβ„Š. Encryption may involves use of keys.A key is a specific piece of information that is used to perform encryption and decryption.The longer the key,the stronger the encryption.encryption can be performed by using public and private keys.The private key is never shared and is kept secret by one party during two way encryption. the public key can be given to anyone.Only the public key in a pair can decrypt data encoded with the corresponding private key,and only the private key in a pair can decrypt data encoded with the corresponding public key. it is becoming more common to encrypt many forms of communications and data streams,as well as entire hard disks.some operating systems support whole disk encryption and there are many tools that are capable of encrypting all or part of the data on a disk or drive. tomorrow i gonna post again part1,part2,part3 and part4 for those who missed .... come back Monday(22-Dec:6pm) to know about certificate-Based security ...kindly like share and comment....

No comments:

Post a Comment