5. www.infosectrain.com | sales@infosectrain.com
We will discuss the ninth domain of CEH, which is ‘Cryptography.’
What is cryptography?
Cryptography is a technique through which we can convert plain text into ciphertext and can
convert the ciphertext into plain text. Didn’t get my point? No worries! Let me give you a
simple example.
6. www.infosectrain.com | sales@infosectrain.com
Assume there are two friends staying in different corners of the world.
And, one of them (let’s say Bob) is sending a piece of confidential
information to another (let’s say, Alexa). Now, in between, some
attackers may access this information to avoid this by Using a key, Bob
may convert the plain text (original message) into ciphertext
(a combination of random numbers and alphabets). Now, even if the
attacker finds the message, he will not understand it. And finally, after
receiving the message, Alexa can use the key to convert the ciphertext
into plaintext. This entire process of converting the texts to maintain
their secrecy is called cryptography.
7. www.infosectrain.com | sales@infosectrain.com
As shown in the figure, the original message is 1065256; this message is applied to an
encryption key. This key is used in the encryption algorithm by which the message is
converted in a ciphertext (unreadable format), This ciphertext will be sent across the
network to the other end of the world. The other person for whom the message is sent
will use a decryption key and ciphertext as a parameter of the decryption algorithm and
get the original message (1065256).
Keys? What keys? Is this your question? Then go further.
8. www.infosectrain.com | sales@infosectrain.com
Keys
In cryptography, keys are strings of characters (combinations of letters, numbers, and
symbols) used in an encryption algorithm for altering data so that it appears random.
Just like physical keys, these keys also lock (encrypt) the data, and only someone with
the correct key can unlock (decrypt) the data.
Objectives of cryptography
Cryptography concentrates on four different objectives.
1.Non-repudiation: This term refers to a message that can never be retracted by the
sender or taken back.
2.Confidentiality: Private communications are protected by confidentiality, ensuring
the intended recipient can only read the message after it has been decrypted.
3.Authenticity: Authenticity helps ensure that both senders and recipients can verify
each other’s identities and that the intended recipients have received the message.
4.Integrity: Integrity is the ability to ensure that the information in a message cannot
be modified while it is being stored or transported.
9. www.infosectrain.com | sales@infosectrain.com
Types of Cryptography
Symmetric key cryptography: Symmetric key cryptography or symmetric encryption is an
algorithm for cryptography that utilizes the same cryptographic key for both the plaintext’s
encryption plus the ciphertext’s decryption. The keys may be related, or there may be a slight
variation between the two keys.
10. www.infosectrain.com | sales@infosectrain.com
Asymmetric key cryptography: Asymmetric cryptography, also called public-key cryptography, is a
process that encrypts and decrypts a message with two related keys, one public and one private, to
prevent unauthorized access or use of confidential information.
11. www.infosectrain.com | sales@infosectrain.com
The importance of cryptography
1.Privacy: Whether we are talking about the digital or physical worlds, privacy
is all we care about. I’m not sure about the physical world, but cryptography
can give us privacy in the digital universe. By encrypting our data, we ensure
that only legitimate users can view it, and hackers, cybercriminals, internet
providers, and even government agencies cannot access our data.
2.Authentication: In cryptography, we scramble our original data using a
random passcode, called an encryption key, in order to protect it. Using this
key eliminates the possibility that others will access your data. Sometimes
hackers pretend to be authorized users in order to gain access. So, making the
encryption key authenticated will protect your data.
12. www.infosectrain.com | sales@infosectrain.com
CEH with InfosecTrain
InfosecTrain is one of the leading training providers with a pocket-friendly
budget. We invite you to join us for an unforgettable journey with industry
experts to gain a better understanding of the Certified Ethical Hacker
course. Courses can be taken as live instructor-led sessions or as self-paced
courses, allowing you to complete your training journey at your own
convenience.
13. About InfosecTrain
• Established in 2016, we are one of the finest
Security and Technology Training and
Consulting company
• Wide range of professional training programs,
certifications & consulting services in the IT
and Cyber Security domain
• High-quality technical services, certifications
or customized training programs curated with
professionals of over 15 years of combined
experience in the domain
www.infosectrain.com | sales@infosectrain.com
15. Why InfosecTrain Global Learning Partners
Flexible modes
of Training
Tailor Made
Training
Post training
completion
Certified and
Experienced Instructors
Access to the
recorded
sessions
www.infosectrain.com | sales@infosectrain.com
18. Contact us
Get your workforce reskilled
by our certified and
experienced instructors!
IND: 1800-843-7890 (Toll Free) / US: +1 657-221-1127 /
UK : +44 7451 208413
sales@infosectrain.com
www.infosectrain.com