1 / 18

Domain 9 of CEH Cryptography

Cryptography is a technique through which we can convert plain text into ciphertext and can convert the ciphertext into plain text. Didnu2019t get my point? No worries! Let me give you a simple example.

Download Presentation

Domain 9 of CEH Cryptography

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Domain 9 of CEH: Cryptography www.infosectrain.com | sales@infosectrain.com

  2. www.infosectrain.com | sales@infosectrain.com

  3. Domains of CEH Information Security and Ethical Hacking Overview-6% Reconnaissance Techniques-21% System hacking phases and Attack Techniques-17% Network and perimeter hacking-14% Web application hacking-16% Wireless network hacking-6% Mobile platform, IoT, and OT hacking-8% Cloud Computing-6% Cryptography-6% www.infosectrain.com | sales@infosectrain.com

  4. www.infosectrain.com | sales@infosectrain.com

  5. We will discuss the ninth domain of CEH, which is ‘Cryptography.’ What is cryptography? Cryptography is a technique through which we can convert plain text into ciphertext and can convert the ciphertext into plain text. Didn’t get my point? No worries! Let me give you a simple example. www.infosectrain.com | sales@infosectrain.com

  6. Assume there are two friends staying in different corners of the world. And, one of them (let’s say Bob) is sending a piece of confidential information to another (let’s say, Alexa). Now, in between, some attackers may access this information to avoid this by Using a key, Bob may convert the plain text (original message) into ciphertext (acombination of random numbers and alphabets). Now, even if the attacker finds the message, he will not understand it. And finally, after receiving the message, Alexa can use the key to convert the ciphertext into plaintext. This entire process of converting the texts to maintain their secrecy is called cryptography. www.infosectrain.com | sales@infosectrain.com

  7. As shown in the figure, the original message is 1065256; this message is applied to an encryption key. This key is used in the encryption algorithm by which the message is converted in a ciphertext (unreadable format), This ciphertext will be sent across the network to the other end of the world. The other person for whom the message is sent will use a decryption key and ciphertext as a parameter of the decryption algorithm and get the original message (1065256). Keys? What keys? Is this your question? Then go further. www.infosectrain.com | sales@infosectrain.com

  8. Keys In cryptography, keys are strings of characters (combinations of letters, numbers, and symbols) used in an encryption algorithm for altering data so that it appears random. Just like physical keys, these keys also lock (encrypt) the data, and only someone with the correct key can unlock (decrypt) the data. Objectives of cryptography Cryptography concentrates on four different objectives. Non-repudiation: This term refers to a message that can never be retracted by the sender or taken back. Confidentiality: Private communications are protected by confidentiality, ensuring the intended recipient can only read the message after it has been decrypted. Authenticity: Authenticity helps ensure that both senders and recipients can verify each other’s identities and that the intended recipients have received the message. Integrity: Integrity is the ability to ensure that the information in a message cannot be modified while it is being stored or transported. www.infosectrain.com | sales@infosectrain.com

  9. Types of Cryptography Symmetric key cryptography: Symmetric key cryptography or symmetric encryption is an algorithm for cryptography that utilizes the same cryptographic key for both the plaintext’s encryption plus the ciphertext’s decryption. The keys may be related, or there may be a slight variation between the two keys. www.infosectrain.com | sales@infosectrain.com

  10. Asymmetric key cryptography: Asymmetric cryptography, also called public-key cryptography, is a process that encrypts and decrypts a message with two related keys, one public and one private, to prevent unauthorized access or use of confidential information. www.infosectrain.com | sales@infosectrain.com

  11. The importance of cryptography Privacy: Whether we are talking about the digital or physical worlds, privacy is all we care about. I’m not sure about the physical world, but cryptography can give us privacy in the digital universe. By encrypting our data, we ensure that only legitimate users can view it, and hackers, cybercriminals, internet providers, and even government agencies cannot access our data. Authentication: In cryptography, we scramble our original data using a random passcode, called an encryption key, in order to protect it. Using this key eliminates the possibility that others will access your data. Sometimes hackers pretend to be authorized users in order to gain access. So, making the encryption key authenticated will protect your data. www.infosectrain.com | sales@infosectrain.com

  12. CEH with InfosecTrain InfosecTrain is one of the leading training providers with a pocket-friendly budget. We invite you to join us for an unforgettable journey with industry experts to gain a better understanding of the Certified Ethical Hacker course. Courses can be taken as live instructor-led sessions or as self-paced courses, allowing you to complete your training journey at your own convenience. www.infosectrain.com | sales@infosectrain.com

  13. About InfosecTrain • Established in 2016, we are one of the finest Security and Technology Training and Consulting company • Wide range of professional training programs, certifications & consulting services in the IT and Cyber Security domain • High-quality technical services, certifications or customized training programs curated with professionals of over 15 years of combined experience in the domain www.infosectrain.com | sales@infosectrain.com

  14. Our Endorsements www.infosectrain.com | sales@infosectrain.com

  15. Why InfosecTrain Global Learning Partners Access to the recorded sessions Certified and Experienced Instructors Flexible modes of Training Post training completion Tailor Made Training www.infosectrain.com | sales@infosectrain.com

  16. Our Trusted Clients www.infosectrain.com | sales@infosectrain.com

  17. Contact us Get your workforce reskilled by our certified and experienced instructors! IND: 1800-843-7890 (Toll Free) / US: +1 657-221-1127 / UK : +44 7451 208413 sales@infosectrain.com www.infosectrain.com

More Related