Introduction to security and ethical hacking-part 4 In this session,we will learn about cryptographic fundamentals
Introduction to security and ethical hacking-part 4 In this session,we will learn about cryptographic fundamentals ... ------------------------------------------------------------------------------------- CRYPTOGRAPHIC FUNDAMENTALS:- cryptography is the science of hiding or encrypting information.The practice of cryptography is very old and has been evolving since ancient times.cryptography is a powerful and complex mechanism to maintain computer security.Modern communications and computing use cryptography extensively to protect sensitive information and communications from unauthorized access. There are many cryptographic techniques that can accomplish the goals of the CIA triad.Encryption is a cryptographic technique that converts data from plain or cleartext form,into coded or π°πΆπ½π΅π²πΏππ²π
π π³πΌπΏπΊ(meaning mentioned below).only authorized recipients with the necessary decryption information can decode and read the data. π°πΆπ½π΅π²πΏππ²π
π:π πΈπΎπ
π½β―π πΎπ πΆ ππ
β―πΈπΎπ»πΎπΈ πβ―π β΄π» πΆπΈππΎβ΄ππ ππβ―πΉ πβ΄ β―ππΈπππ
π πΉπΆππΆ.π«ππΆπΎππβ―ππ πΎπ ππ½β― β΄ππΎβπΎππΆπ,ππ-β―ππΈβ΄πΉβ―πΉ πΉπΆππΆ.πͺππΈβ― ππ½β― πΈπΎπ
π½β―π πΎπ πΆπ
π
ππΎβ―πΉ πβ΄ ππ½β― π
ππΆπΎππβ―ππ,ππ½β― β΄π·πππβ―πΉ πΉπΆππΆ πΎπ ππβ΄π πΆπ πβπ«ββ°β π―β°π³π―.π―π½β― πβ―πβ―ππβ― π
πβ΄πΈβ―ππ β΄π» πππΆππππΆππΎπβ πΈπΎπ
π½β―π πβ―ππ πβ΄ πΈπβ―πΆπ πβ―ππ πΎπ ππβ΄π πΆπ πΉβ―πΈπΎπ
π½β―ππΎπβ. Encryption may involves use of keys.A key is a specific piece of information that is used to perform encryption and decryption.The longer the key,the stronger the encryption.encryption can be performed by using public and private keys.The private key is never shared and is kept secret by one party during two way encryption. the public key can be given to anyone.Only the public key in a pair can decrypt data encoded with the corresponding private key,and only the private key in a pair can decrypt data encoded with the corresponding public key. it is becoming more common to encrypt many forms of communications and data streams,as well as entire hard disks.some operating systems support whole disk encryption and there are many tools that are capable of encrypting all or part of the data on a disk or drive. tomorrow i gonna post again part1,part2,part3 and part4 for those who missed .... come back Monday(22-Dec:6pm) to know about certificate-Based security ...kindly like share and comment....
No comments:
Post a Comment