CRYPTOGRAPHY
Cryptography has been derived from two Greek words (Kryptos & Graphite) which means secret writing.
I will try to explain this in layman’s language;
- In case you wish to communicate secretly with someone and you have designed and shared your coded language for that. The code is a secret between both of you, This is a small example of cryptography.
- It converts your simple Hello to some scrambled text may be some numbers characters, special characters; depends on the logic or the mathematics which you have used. It could be as simple as Julius ceaser, algorithm which just replace or swap with the key.
Encryption
Suppose the key is 2 and the plain text or message which you wish to share is HELLO. So H will move two (2 is the Key in this case) places further.
i.e. H will be replaced by K; E will be replaced by H, L will be replaced by O and so on.
This process is known as Encryption as you are converting plain text to unreadable format.
Decryption
When the receiver receives the cipher or scrambled message, i.e. “KHOOR”. He will decipher it by using the same key but will go in reverse direction (-2).
i.e K will be replaced by H (two places before K), H will be replaced E and so on.
This process is known as Decryption.
All cryptography algorithm can be divided into two parts:
- Symmetric cryptography
- Asymmetric cryptography
What is the difference between symmetric and asymmetric cryptography?
- With symmetric cryptography, the same key is used for both encryption and decryption. A sender and a recipient must already have a shared key that is known to both. Key distribution is a tricky problem and was the impetus for developing asymmetric cryptography.
- With asymmetric crypto, two different keys are used for encryption and decryption. Every user in an asymmetric cryptosystem has both a public key and a private key. The private key is kept secret at all times, but the public key may be freely distributed.
There are 3 basic cryptographic algorithms :
- Secret Key
- Public Key
- Message Digest ( hash tables )
Top Cryptography Tools
1. Security Token/Authentication Token
2. CertMgr.exe
3. JCA
4. Docker
5. SignTool.exe
NOTE: OUR EACH AND EVERY PICTURE OF THIS BLOG IS DIRECTLY TAKEN BY GOOGLE.COM AND SOME CONTENT IS ALSO COPIED FROM GOOGLE FOR BETTER ANALYTICS AND PROPER REPORT.
THANK YOU VERY MUCH
PLEASE SHOW YOUR LOVE BY LIKE , COMMENTS AND SUBSCRIBE US FOR MORE TECH RELATED CONTENT
our telegram link
https://t.me/w36c0d3r
Our youtube teaser video
https://youtu.be/D5XwOuB4ZMg
http://www.scriptkiddies.cf/
our website link
https://www.scriptkiddieshackers.com/2020/06/hacking-hacking-refers-to.html
our blog link
https://instagram.com/script_kiddies_developers?igshid=17prws6olul0r
Our Instagram page link
https://instagram.com/team_script_kiddies?igshid=ei7vr4q1vpls
FOR MORE INFORMATION ABOUT THIS YOU CAN CONTACT ME AS MY DETAILS ARE GIVEN
FOR MORE INFORMATION ABOUT THIS YOU CAN CONTACT ME AS MY DETAILS ARE GIVEN
0 Comments