180 likes | 200 Views
Cryptography is a technique through which we can convert plain text into ciphertext and can convert the ciphertext into plain text. Didnu2019t get my point? No worries! Let me give you a simple example.
E N D
Domain 9 of CEH: Cryptography www.infosectrain.com | sales@infosectrain.com
Domains of CEH Information Security and Ethical Hacking Overview-6% Reconnaissance Techniques-21% System hacking phases and Attack Techniques-17% Network and perimeter hacking-14% Web application hacking-16% Wireless network hacking-6% Mobile platform, IoT, and OT hacking-8% Cloud Computing-6% Cryptography-6% www.infosectrain.com | sales@infosectrain.com
We will discuss the ninth domain of CEH, which is ‘Cryptography.’ What is cryptography? Cryptography is a technique through which we can convert plain text into ciphertext and can convert the ciphertext into plain text. Didn’t get my point? No worries! Let me give you a simple example. www.infosectrain.com | sales@infosectrain.com
Assume there are two friends staying in different corners of the world. And, one of them (let’s say Bob) is sending a piece of confidential information to another (let’s say, Alexa). Now, in between, some attackers may access this information to avoid this by Using a key, Bob may convert the plain text (original message) into ciphertext (acombination of random numbers and alphabets). Now, even if the attacker finds the message, he will not understand it. And finally, after receiving the message, Alexa can use the key to convert the ciphertext into plaintext. This entire process of converting the texts to maintain their secrecy is called cryptography. www.infosectrain.com | sales@infosectrain.com
As shown in the figure, the original message is 1065256; this message is applied to an encryption key. This key is used in the encryption algorithm by which the message is converted in a ciphertext (unreadable format), This ciphertext will be sent across the network to the other end of the world. The other person for whom the message is sent will use a decryption key and ciphertext as a parameter of the decryption algorithm and get the original message (1065256). Keys? What keys? Is this your question? Then go further. www.infosectrain.com | sales@infosectrain.com
Keys In cryptography, keys are strings of characters (combinations of letters, numbers, and symbols) used in an encryption algorithm for altering data so that it appears random. Just like physical keys, these keys also lock (encrypt) the data, and only someone with the correct key can unlock (decrypt) the data. Objectives of cryptography Cryptography concentrates on four different objectives. Non-repudiation: This term refers to a message that can never be retracted by the sender or taken back. Confidentiality: Private communications are protected by confidentiality, ensuring the intended recipient can only read the message after it has been decrypted. Authenticity: Authenticity helps ensure that both senders and recipients can verify each other’s identities and that the intended recipients have received the message. Integrity: Integrity is the ability to ensure that the information in a message cannot be modified while it is being stored or transported. www.infosectrain.com | sales@infosectrain.com
Types of Cryptography Symmetric key cryptography: Symmetric key cryptography or symmetric encryption is an algorithm for cryptography that utilizes the same cryptographic key for both the plaintext’s encryption plus the ciphertext’s decryption. The keys may be related, or there may be a slight variation between the two keys. www.infosectrain.com | sales@infosectrain.com
Asymmetric key cryptography: Asymmetric cryptography, also called public-key cryptography, is a process that encrypts and decrypts a message with two related keys, one public and one private, to prevent unauthorized access or use of confidential information. www.infosectrain.com | sales@infosectrain.com
The importance of cryptography Privacy: Whether we are talking about the digital or physical worlds, privacy is all we care about. I’m not sure about the physical world, but cryptography can give us privacy in the digital universe. By encrypting our data, we ensure that only legitimate users can view it, and hackers, cybercriminals, internet providers, and even government agencies cannot access our data. Authentication: In cryptography, we scramble our original data using a random passcode, called an encryption key, in order to protect it. Using this key eliminates the possibility that others will access your data. Sometimes hackers pretend to be authorized users in order to gain access. So, making the encryption key authenticated will protect your data. www.infosectrain.com | sales@infosectrain.com
CEH with InfosecTrain InfosecTrain is one of the leading training providers with a pocket-friendly budget. We invite you to join us for an unforgettable journey with industry experts to gain a better understanding of the Certified Ethical Hacker course. Courses can be taken as live instructor-led sessions or as self-paced courses, allowing you to complete your training journey at your own convenience. www.infosectrain.com | sales@infosectrain.com
About InfosecTrain • Established in 2016, we are one of the finest Security and Technology Training and Consulting company • Wide range of professional training programs, certifications & consulting services in the IT and Cyber Security domain • High-quality technical services, certifications or customized training programs curated with professionals of over 15 years of combined experience in the domain www.infosectrain.com | sales@infosectrain.com
Our Endorsements www.infosectrain.com | sales@infosectrain.com
Why InfosecTrain Global Learning Partners Access to the recorded sessions Certified and Experienced Instructors Flexible modes of Training Post training completion Tailor Made Training www.infosectrain.com | sales@infosectrain.com
Our Trusted Clients www.infosectrain.com | sales@infosectrain.com
Contact us Get your workforce reskilled by our certified and experienced instructors! IND: 1800-843-7890 (Toll Free) / US: +1 657-221-1127 / UK : +44 7451 208413 sales@infosectrain.com www.infosectrain.com