Computing | Computer Security | Linux Security | Industrial Control Systems Security | Penetration Testing | Exploitation | Social Engineering | Metasploit | encryption | IDS/IPS
Crytography
Cryto / \ visible invisible / \ \ encryption hashing stagenography / \ asymmetric symmetric / \ \ publicKey privateKey uniqueKey
Symmetric Key
- DES
- 3DES
- AES*
Number of keys required is: N(N-1) ----- 2For each person in the network I need to have a unique key (N), the next person in the Network needs to keep (N-1) keys, etc.. etc... so the number of keys becomes N + (N-1).
Asymmetric Encryption
- Generate Key Pair
- Share Public Key
- Import the Public Key of the Receiver
- Encrypt - Public - Receiver
- Decrypt - Private - Receiver
- DEFFIE-HELLMAN
- RSA*
- PGP - MIT PGP Server
Tools
- Mailvelope - Chrome Extension for PGP
Number of keys required is: 2N
Hashing
- MD5
- SHA1
- SHA256*
Stegnography
ADS (alternate data stream) - Vulnerability - DLP (Data Leak/Lock Prevention) tools- image hiding
Tools, Links and Reading Lists
}01dec16 | admin |