Computing |
Computer Security |
Linux Security |
Industrial Control Systems Security |
Penetration Testing |
Exploitation |
Social Engineering |
Metasploit |
encryption |
IDS/IPS
Crytography
Cryto
/ \
visible invisible
/ \ \
encryption hashing stagenography
/ \
asymmetric symmetric
/ \ \
publicKey privateKey uniqueKey
Symmetric Key
There is a problem in symmetric encryption because of the number of keys required for N number of
people in a network. Which is:
Number of keys required is: N(N-1)
-----
2
For each person in the network I need to have a unique key (N), the next person in the Network needs to keep (N-1) keys, etc.. etc... so the number of keys becomes N + (N-1).
Asymmetric Encryption
- Generate Key Pair
- Share Public Key
- Import the Public Key of the Receiver
- Encrypt - Public - Receiver
- Decrypt - Private - Receiver
Tools
- Mailvelope - Chrome Extension for PGP
Number of keys required is: 2N
Hashing
Stegnography
ADS (alternate data stream) - Vulnerability - DLP (Data Leak/Lock Prevention) tools
Tools, Links and Reading Lists
}
http:///wiki/?encryption