Computing | Computer Security | Linux Security | Industrial Control Systems Security | Penetration Testing | Exploitation | Social Engineering | Metasploit | encryption | IDS/IPS


			   /   \
                      visible invisible
                       /   \        \
	       encryption  hashing   stagenography
	       /       \
	asymmetric   symmetric
	/       \          \
    publicKey   privateKey   uniqueKey

Symmetric Key

There is a problem in symmetric encryption because of the number of keys required for N number of people in a network. Which is:

    Number of keys required is:   N(N-1)
For each person in the network I need to have a unique key (N), the next person in the Network needs to keep (N-1) keys, etc.. etc... so the number of keys becomes N + (N-1).

Asymmetric Encryption

  1. Generate Key Pair
  2. Share Public Key
  3. Import the Public Key of the Receiver
  4. Encrypt - Public - Receiver
  5. Decrypt - Private - Receiver


    Number of keys required is:   2N



ADS (alternate data stream) - Vulnerability - DLP (Data Leak/Lock Prevention) tools

Tools, Links and Reading Lists


01dec16   admin