PGP: A Hybrid Solution

By Jessica Benz

Cryptography is the science of keeping data secure. Encryption is the process of using cryptography to encode data so that it’s meaning is not immediately obvious. There are two main types of cryptography that are used, symmetric and asymmetric. It is also possible to use a hybrid of the two; Pretty Good Privacy (PGP) by Network Associates is an example of this. Symmetric and asymmetric cryptography both have advantages and disadvantages that will be discussed in this paper. PGP brings the best of each together and also works to minimize the disadvantages. This will also be discussed. Alice and Bob are often used as examples when cryptography is explained, therefore I will also use them for most examples.

» Read more

Cryptography Fundamentals – InfoSec Resources

by InfoSec Resources

In this book we will learn about various aspects of cryptography. We’ll start with cryptography objectives, the need for it, various types of cryptography, PKI, and look at some practical usage in our daily digital communication. This book is intended for beginners and each concept will be thoroughly explained, including examples which end users can perform on their machines

» Read more

Cryptography Basics

As hackers, we are often faced with the hurdle of cryptography and encryption. In some cases, we use it to hide our actions and messages. Many applications and protocols use encryption to maintain confidentiality and integrity of data. To be able to crack passwords and encrypted protocols such as SSL and wireless, you need to at least be familiar with the concepts and terminology of cryptography and encryption. ​ To many new hackers, all the concepts and terminology of cryptography can be a bit overwhelming and opaque. Cryptography is the science and art of hiding messages so that they are confidential, then “unhiding” them so that only the intended recipient can read them. Basically, we can say that cryptography is the science of secret messaging.

» Read more

Module 1: Application & Use of Cryptography – InfoSec Resources

Dalasta Darren

The cryptography section on the CISSP exam has proven to be one of the most difficult domains for many of our students. This video takes you through the domain as it relates to the CISSP exam. This is also a great primer for anybody interested in learning cryptography in general.

» Read more

Basics of Cryptography: the practical application and use of cryptography

Jayanthi

Cryptography originated about 4000 years ago, and the world of cryptography has evolved a lot since then. Today ‘Cryptography’ is omnipresent in our lives without most of us realizing it. The fundamental aspect of ‘Cryptography’ has remained the same through time which is to hide information in transit and make it available only for the intended recipients. We will see the basic types of cryptography followed by the application and use of cryptography in real life. Cryptographic principles: Cryptography involves the use of terms like plain text, cipher text, algorithm, key, encryption, and decryption. ‘Plain text’ is the text or message that needs to be transmitted to the intended recipients and which needs to be hidden. ‘Cipher text’ on the other hand, is the text that has been transformed by algorithms and which is gibberish.

» Read more

CISSP Cryptography Mini Course – InfoSec Resources

By Dalasta Darren

The cryptography section on the CISSP exam has proven to be one of the most difficult domains for many of our students. This short course takes you through the domain as it relates to the CISSP exam. This is also a great primer for anybody interested in learning cryptography in general.

» Read more

Quantum Cryptography

By Coder Geek

“Quantum cryptography uses photons and physics to generate cryptographic keys” What is quantum cryptography? Quantum cryptography is NOT a new algorithm to encrypt and decrypt data. Rather it is a technique of using photons to generate a cryptographic key and transmit it to a receiver using a suitable communication channel. A cryptographic key plays the most important role in cryptography; it is used to encrypt/decrypt data. Types of cryptography There are two types of cryptography: Symmetric Cryptography Asymmetric Cryptography Symmetric Key Cryptography is also known as Secret Key Cryptography (SKC) where a key (any text, numbers, etc.) is used to encrypt data, and the same key is used to decrypt that data. The smallest change in the secret key will fail to decrypt an encrypted message. For example, text that is encrypted using AES encryption with key Infosec will fail to decrypt another cipher text which was encrypted using key INFOSEC.

» Read more

A Novel Selective Encryption Method for Securing Text Over Mobile Ad Hoc Network

by Ajay Kushwaha, Hari Ram Sharma, Asha Ambhaikar

In today’s era, security is getting important day by day. But security constraints for the text data which is sent over the network is also fetching confront with the attractiveness. This paper introduces a selective encryption method named Selective significant data encryption (SSDE) for text data encryption. The SSDE provides sufficient uncertainty to the data encryption process as it selects only significant data out of the whole message. This in turn reduces the encryption time overhead and enhances the performance. The encryption part is performed by the help of symmetric key algorithm. For this purpose BLOWFISH algorithm is used. First, I introduce the concept of cryptography, and symmetric and asymmetric types of encryption methods. Then the overview of selective encryption is given which is followed by the introduction of SSDE. In this research, I proposed a method SSDE which is compared with existing methods, that is, full data encryption and Toss-A-Coin method with the simulation experimental setup based on NS 2.35.
» Read more

1 5 6 7