SlideShare a Scribd company logo
1 of 34
Download to read offline
Module XXI
Cryptography
Ethical Hacking
Version 5
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Module Objective
This module will familiarize you with the following:
Public-key Cryptography
RSA
Algorithms and Security
MD-5
Secure Hash Algorithm
Secure Socket Layer
RC5
Secure Shell
Pretty Good Privacy
Code-Breaking Methodologies
Cryptography Attacks
Cracking Tools
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Module Flow
Public-key
Cryptography
Algorithms and
Security
MD-5
RSA
RC5
SHA
SSL
PGP
Cracking Tools
Cryptography Attacks
SSH
Code Breaking
Methodology
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Public-key Cryptography
Public-key cryptography was invented in 1976 by
Whitfield Diffie and Martin Hellman
In this system, each person receives a pair of keys,
called the public-key, and the private-key
Each person’s public-key is published while the
private-key is kept secret
Anyone can send a confidential message using
public information, but it can only be decrypted
with a private-key that is in the sole possession of
the intended recipient
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Working of Encryption
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Digital Signature
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
RSA (Rivest Shamir Adleman)
RSA is a public-key cryptosystem
developed by MIT professors Ronald
L. Rivest, Adi Shamir, and Leonard
M. Adleman in 1977, in an effort to
help ensure Internet security
RSA uses modular arithmetic, and
elementary number theories to
perform computations using two very
large prime numbers
RSA encryption is widely used and is
the de-facto encryption standard
Rivest Shamir Adleman
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
RC4, RC5, RC6, Blowfish
Is a 64-bit block cipher that uses a key length that can
vary between 32 and 448 bits
Blowfish
RC6 adds two features to RC5: the inclusion of integer
multiplication, and the use of four 4-bit working
registers instead of RC5’s two 2-bit registers
Rc6
Is a parameterized algorithm with a variable block size,
key size, and a variable number of rounds
Rc5
Is a variable key size stream cipher with byte-oriented
operations, and is based on the use of a random
permutation
Rc4
FeaturesAlgorithm
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Algorithms and Security
40-bit key algorithms are of no use
56-bit key algorithms offer privacy, but are
vulnerable
64-bit key algorithms are safe today but will be
soon threatened as the technology evolves
128-bit and over algorithms are almost
unbreakable
256-bit and above are impossible
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Brute-Force Attack
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
RSA Attacks
Brute-force RSA factoring
Esoteric attack
Chosen cipher text attack
Low encryption exponent attack
Error analysis
Other attacks
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Message Digest Functions
Message digest functions change the information contained in a file, (small or
large) into a single large number, typically between 128 and 256 bits in length
The best message digest functions combine these mathematical properties
Every bit of the message digest function is influenced by the function's input
If any given bit of the function's input is changed, every output bit has a 50
percent chance of changing
Given an input file and its corresponding message digest, it should be
computationally infeasible to find another file with the same
message digest value
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Message Digest
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
One-way Bash Functions
Message digests are also called one-way bash functions because they produce
values that are difficult to invert, resistant to attack, mostly unique, and are
widely distributed
Message digest algorithms themselves are not used for encryption and
decryption operations
They are used in the creation of digital signatures, message authentication
codes (MACs), and encryption keys from passphrases
Message digest functions:
– HMAC
– MD2
– MD4
– MD5
– SHA
– SHA-1
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
MD5
The MD5 algorithm takes as input, a message of arbitrary length, and
outputs a 128-bit fingerprint or message digest of the input
The MD5 algorithm is intended for digital signature applications,
where a large file is compressed in a secure manner before being
encrypted with a private (secret) key under a public-key
cryptosystem, such as RSA
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
SHA (Secure Hash Algorithm)
The SHA algorithm takes as input, a message of
arbitrary length and outputs a 160-bit
fingerprint or message digest of the input
The algorithm is slightly slower than MD5, but
the larger message digest makes it more secure
against brute-force collision and inversion
attacks
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
SSL (Secure Sockets Layer)
SSL stands for Secure Sockets
Layer. SSL is a protocol
developed by Netscape for
transmitting private documents
via the Internet
SSL works by using a private-
key to encrypt data which is
transferred over the SSL
connection
SSL Protocol is an independent
application protocol
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
RC5 is a fast, symmetric block cipher designed by
RSA Security in 1994
It is a parameterized algorithm with a variable
block size, a variable key size, and a variable
number of rounds. The key size is 128-bits
RC6 is a block cipher based on RC5. Like RC5,
RC6 is a parameterized algorithm where the
block size, the key size, and the number of rounds
are variable. The upper limit on the key size is
2040-bits
RC5
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
SSH (Secure Shell)
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Government Access to Keys (GAK)
Government Access to Keys (also known as
key escrow) means that software companies
will give copies of all keys, (or at least enough
of the key that the remainder could be
cracked) to the government
The government promises that they will hold
on to the keys in a secure way, and will only
use them when a court issues a warrant to do
so
To the government, this issue is similar to the
ability to wiretap phones
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
RSA Challenge
The RSA factoring challenge is an effort, sponsored by RSA
Laboratories, to learn about the difficulty of factoring large
numbers used in RSA keys
A set of eight challenge numbers, ranging in size from 576-bits to
2048-bits, are given
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
distributed.net
http://www.distributed.net
An attempt to crack RC5 encryption using a network of computers worldwide
The client utility, when downloaded from distributed.net, runs the crack algorithm
as a screensaver, and sends the results to the distributed.net connected servers
The challenge is still running
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Cleversafe Grid Builder
http://www.cleversafe.com/
Cleversafe Grid Builder EN software subscriptions provide all the software
that you need to build your own dispersed storage grid
The 11 dispersed storage nodes can be spread across up to 11 servers for
maximum security benefits
Benefits of Building Your Own Grid:
• Control your data within your own four walls based on your existing offices and
infrastructure
• Utilize the most innovative technology to reach the storage market in decades
• Avoid expensive hardware costs, and use older storage devices you have around
• Customize your implementation based on your environment
• Create derivative works by changing source code to meet your storage needs
and processes
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
PGP (Pretty Good Privacy)
Pretty Good Privacy (PGP) is a software package originally developed by Philip
R. Zimmermann, which provides cryptographic routines for email, and file
storage applications
Zimmermann took existing cryptosystems and cryptographic protocols, and
developed a program that can run on multiple platforms
It provides message encryption, digital signatures, data compression, and
email compatibility
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Code Breaking: Methodologies
The various methodologies used for code breaking are:
• Using brute-force
• Frequency analysis
• Trickery and deceit
• One-time pad
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Cryptography Attacks
Cryptography attacks are based on the assumption that the cryptanalyst
has knowledge of the encrypted information
There are seven types of Cryptography attacks:
• Ciphertext-only attack
• Known-plaintext attack
• Chosen-plaintext
• Adaptive chosen-plaintext attack
• Chosen-ciphertext attack
• Chosen-key attack
• Rubber hose attack
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Disk Encryption
Disk encryption works similarly to text message
encryption
With the use of an encryption program for your disk,
you can safeguard any information to burn onto the
disk, and keep it from falling into the wrong hands
Encryption for disks is useful when you need to send
sensitive information through the mail
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Hacking Tool: PGP Crack
http://munitions.iglu.cjb.net/dolphin.cgi?action=render&category=0406
PGP crack is a program designed to brute force a conventionally
encrypted file with a PGP, or a PGP secret key
The file pgpfile cannot be ascii-armored. The file phraselist should be a
file containing all of the passphrases that will be used to crack the
encrypted file
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Cracking S/MIME Encryption Using
Idle CPU Time
Tries to brute-force an S/MIME encrypted email message
by translating an S/MIME encrypted message to RC2
format, and then trying all the possible keys to decrypt the
message
This brute-force utility comes in two forms:
• Command line
• Screen saver
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
CypherCalc
Is a full-featured, programmable
calculator designed for multi-precision
integer arithmetic
It is intended for use in the design,
testing, and analysis of cryptographic
algorithms involving key exchanges,
modular exponentiation, modular
inverses, and Montgomery Math
It has built-in GCD and SHA 1 tools,
and a CRC tool that can generate CRC
tables for your applications
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Command Line Scriptor
Automates file encryption/decryption, digital signing, and verification
Sends files and email securely without any user intervention
Ensures that all of the important data is secured without relying on
user input
Bulk deletes files at a pre-defined date and time
Integrates cryptographic techniques into the existing applications
Processes incoming secure files from any OpenPGP compliant
application
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Screenshot of Command Line Scriptor
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
CryptoHeaven
CryptoHeaven allows groups to send encrypted email, securely backup and
share files, pictures, charts, business documents, and any other form of
electronic media through a secure environment
No third parties, including server administrators, government agencies,
and others have access to the plain text version of the transmitted
information
Some of the features of the service include secure document storage,
secure document sharing and distribution, secure message boards, secure
email, and secure instant messaging
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Summary
Using Public Key Infrastructure (PKI), anyone can send a confidential message using public
information, which can only be decrypted with a private-key in the sole possession of the intended
recipient
RSA encryption is widely used and is a de-facto encryption standard
The MD5 algorithm is intended for digital signature applications, where a large file must be
compressed securely before being encrypted
SHA algorithm takes, as input, a message of arbitrary length and outputs a 160-bit message digest of
the input
Secure Sockets Layer, SSL is a protocol for transmitting private documents via the Internet
RC5 is a fast block cipher designed by RSA Security
SSH (Secure Shell) is a secure replacement for telnet and the Berkeley r-utilities, and provides an
encrypted channel for logging into another computer over a network, executing commands on a
remote computer, and moving files from one computer to another

More Related Content

What's hot

Ceh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networksCeh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networksVi Tính Hoàng Nam
 
Ceh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilitiesCeh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilitiesVi Tính Hoàng Nam
 
Ceh v5 module 11 hacking webservers
Ceh v5 module 11 hacking webserversCeh v5 module 11 hacking webservers
Ceh v5 module 11 hacking webserversVi Tính Hoàng Nam
 
Ceh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypotCeh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypotVi Tính Hoàng Nam
 
Ceh v5 module 08 denial of service
Ceh v5 module 08 denial of serviceCeh v5 module 08 denial of service
Ceh v5 module 08 denial of serviceVi Tính Hoàng Nam
 
Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingCeh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingVi Tính Hoàng Nam
 
Ce hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internetCe hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internetVi Tính Hoàng Nam
 
Ceh v5 module 22 penetration testing
Ceh v5 module 22 penetration testingCeh v5 module 22 penetration testing
Ceh v5 module 22 penetration testingVi Tính Hoàng Nam
 
Network Attacks and Countermeasures
Network Attacks and CountermeasuresNetwork Attacks and Countermeasures
Network Attacks and Countermeasureskaranwayne
 
Ce hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insidersCe hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insidersVi Tính Hoàng Nam
 
Ce hv6 module 41 hacking usb devices
Ce hv6 module 41 hacking usb devicesCe hv6 module 41 hacking usb devices
Ce hv6 module 41 hacking usb devicesVi Tính Hoàng Nam
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2sweta dargad
 

What's hot (20)

Ceh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networksCeh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networks
 
Ceh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilitiesCeh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilities
 
Ceh v5 module 11 hacking webservers
Ceh v5 module 11 hacking webserversCeh v5 module 11 hacking webservers
Ceh v5 module 11 hacking webservers
 
Ceh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypotCeh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypot
 
Ceh v5 module 08 denial of service
Ceh v5 module 08 denial of serviceCeh v5 module 08 denial of service
Ceh v5 module 08 denial of service
 
Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingCeh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hacking
 
Ce hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internetCe hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internet
 
Ceh v5 module 22 penetration testing
Ceh v5 module 22 penetration testingCeh v5 module 22 penetration testing
Ceh v5 module 22 penetration testing
 
Ceh v5 module 14 sql injection
Ceh v5 module 14 sql injectionCeh v5 module 14 sql injection
Ceh v5 module 14 sql injection
 
Session hijacking
Session hijackingSession hijacking
Session hijacking
 
Ceh v5 module 02 footprinting
Ceh v5 module 02 footprintingCeh v5 module 02 footprinting
Ceh v5 module 02 footprinting
 
Security in network
Security in networkSecurity in network
Security in network
 
Network security
Network securityNetwork security
Network security
 
Network Attacks and Countermeasures
Network Attacks and CountermeasuresNetwork Attacks and Countermeasures
Network Attacks and Countermeasures
 
Ce hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insidersCe hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insiders
 
File000144
File000144File000144
File000144
 
Ce hv6 module 41 hacking usb devices
Ce hv6 module 41 hacking usb devicesCe hv6 module 41 hacking usb devices
Ce hv6 module 41 hacking usb devices
 
File000143
File000143File000143
File000143
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
File000142
File000142File000142
File000142
 

Viewers also liked

Viewers also liked (10)

Cehv8 - Module 19: Cryptography
Cehv8 - Module 19: CryptographyCehv8 - Module 19: Cryptography
Cehv8 - Module 19: Cryptography
 
Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and worms
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 

Similar to Ceh v5 module 21 cryptography

Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Ramesh Nagappan
 
Unit III Public Key Crypto Systems.pptx
Unit III Public Key Crypto Systems.pptxUnit III Public Key Crypto Systems.pptx
Unit III Public Key Crypto Systems.pptxSayeeKumarMadhesh
 
Implementing a Secure and Effective PKI on Windows Server 2012 R2
Implementing a Secure and Effective PKI on Windows Server 2012 R2Implementing a Secure and Effective PKI on Windows Server 2012 R2
Implementing a Secure and Effective PKI on Windows Server 2012 R2Frank Lesniak
 
Cryptography101
Cryptography101Cryptography101
Cryptography101NCC Group
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsIRJET Journal
 
How to do Cryptography right in Android Part One
How to do Cryptography right in Android Part OneHow to do Cryptography right in Android Part One
How to do Cryptography right in Android Part OneArash Ramez
 
RISC-V 30906 hex five multi_zone iot firmware
RISC-V 30906 hex five multi_zone iot firmwareRISC-V 30906 hex five multi_zone iot firmware
RISC-V 30906 hex five multi_zone iot firmwareRISC-V International
 
IS413 Topic 5.pptx
IS413 Topic 5.pptxIS413 Topic 5.pptx
IS413 Topic 5.pptxWarrenPhiri4
 
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesThe Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesNRB
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvanitrraincity
 
Hacking RF based IoT devices
Hacking RF based IoT devicesHacking RF based IoT devices
Hacking RF based IoT devicesErez Metula
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneSecurityTube.Net
 
Network security-primer-9544
Network security-primer-9544Network security-primer-9544
Network security-primer-9544Hfz Mushtaq
 

Similar to Ceh v5 module 21 cryptography (20)

Cryptography
CryptographyCryptography
Cryptography
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
 
Unit III Public Key Crypto Systems.pptx
Unit III Public Key Crypto Systems.pptxUnit III Public Key Crypto Systems.pptx
Unit III Public Key Crypto Systems.pptx
 
Implementing a Secure and Effective PKI on Windows Server 2012 R2
Implementing a Secure and Effective PKI on Windows Server 2012 R2Implementing a Secure and Effective PKI on Windows Server 2012 R2
Implementing a Secure and Effective PKI on Windows Server 2012 R2
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Cryptography101
Cryptography101Cryptography101
Cryptography101
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
 
How to do Cryptography right in Android Part One
How to do Cryptography right in Android Part OneHow to do Cryptography right in Android Part One
How to do Cryptography right in Android Part One
 
RISC-V 30906 hex five multi_zone iot firmware
RISC-V 30906 hex five multi_zone iot firmwareRISC-V 30906 hex five multi_zone iot firmware
RISC-V 30906 hex five multi_zone iot firmware
 
IS413 Topic 5.pptx
IS413 Topic 5.pptxIS413 Topic 5.pptx
IS413 Topic 5.pptx
 
Data encryption algorithm(edit)
Data encryption algorithm(edit)Data encryption algorithm(edit)
Data encryption algorithm(edit)
 
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesThe Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
Hacking RF based IoT devices
Hacking RF based IoT devicesHacking RF based IoT devices
Hacking RF based IoT devices
 
RC 4
RC 4 RC 4
RC 4
 
Secure IoT Firmware for RISC-V
Secure IoT Firmware for RISC-VSecure IoT Firmware for RISC-V
Secure IoT Firmware for RISC-V
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam Bowne
 
Network security-primer-9544
Network security-primer-9544Network security-primer-9544
Network security-primer-9544
 
Sectools
SectoolsSectools
Sectools
 
aaa
aaaaaa
aaa
 

More from Vi Tính Hoàng Nam

CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)Vi Tính Hoàng Nam
 
CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)Vi Tính Hoàng Nam
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnVi Tính Hoàng Nam
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108Vi Tính Hoàng Nam
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesVi Tính Hoàng Nam
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoVi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangVi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangVi Tính Hoàng Nam
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQVi Tính Hoàng Nam
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EVi Tính Hoàng Nam
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhVi Tính Hoàng Nam
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhVi Tính Hoàng Nam
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhVi Tính Hoàng Nam
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhVi Tính Hoàng Nam
 

More from Vi Tính Hoàng Nam (20)

CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)
 
CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)
 
Catalogue 2015
Catalogue 2015Catalogue 2015
Catalogue 2015
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vn
 
CATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁTCATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁT
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
 
Các loại cáp mạng
Các loại cáp mạngCác loại cáp mạng
Các loại cáp mạng
 
Catalogue 10-2014-new
Catalogue 10-2014-newCatalogue 10-2014-new
Catalogue 10-2014-new
 
Qtx 6404
Qtx 6404Qtx 6404
Qtx 6404
 
Camera QTX-1210
Camera QTX-1210Camera QTX-1210
Camera QTX-1210
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 Series
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báo
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008E
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênh
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênh
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênh
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênh
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Ceh v5 module 21 cryptography

  • 2. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Module Objective This module will familiarize you with the following: Public-key Cryptography RSA Algorithms and Security MD-5 Secure Hash Algorithm Secure Socket Layer RC5 Secure Shell Pretty Good Privacy Code-Breaking Methodologies Cryptography Attacks Cracking Tools
  • 3. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Module Flow Public-key Cryptography Algorithms and Security MD-5 RSA RC5 SHA SSL PGP Cracking Tools Cryptography Attacks SSH Code Breaking Methodology
  • 4. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Public-key Cryptography Public-key cryptography was invented in 1976 by Whitfield Diffie and Martin Hellman In this system, each person receives a pair of keys, called the public-key, and the private-key Each person’s public-key is published while the private-key is kept secret Anyone can send a confidential message using public information, but it can only be decrypted with a private-key that is in the sole possession of the intended recipient
  • 5. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Working of Encryption
  • 6. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Digital Signature
  • 7. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited RSA (Rivest Shamir Adleman) RSA is a public-key cryptosystem developed by MIT professors Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman in 1977, in an effort to help ensure Internet security RSA uses modular arithmetic, and elementary number theories to perform computations using two very large prime numbers RSA encryption is widely used and is the de-facto encryption standard Rivest Shamir Adleman
  • 8. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited RC4, RC5, RC6, Blowfish Is a 64-bit block cipher that uses a key length that can vary between 32 and 448 bits Blowfish RC6 adds two features to RC5: the inclusion of integer multiplication, and the use of four 4-bit working registers instead of RC5’s two 2-bit registers Rc6 Is a parameterized algorithm with a variable block size, key size, and a variable number of rounds Rc5 Is a variable key size stream cipher with byte-oriented operations, and is based on the use of a random permutation Rc4 FeaturesAlgorithm
  • 9. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Algorithms and Security 40-bit key algorithms are of no use 56-bit key algorithms offer privacy, but are vulnerable 64-bit key algorithms are safe today but will be soon threatened as the technology evolves 128-bit and over algorithms are almost unbreakable 256-bit and above are impossible
  • 10. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Brute-Force Attack
  • 11. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited RSA Attacks Brute-force RSA factoring Esoteric attack Chosen cipher text attack Low encryption exponent attack Error analysis Other attacks
  • 12. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Message Digest Functions Message digest functions change the information contained in a file, (small or large) into a single large number, typically between 128 and 256 bits in length The best message digest functions combine these mathematical properties Every bit of the message digest function is influenced by the function's input If any given bit of the function's input is changed, every output bit has a 50 percent chance of changing Given an input file and its corresponding message digest, it should be computationally infeasible to find another file with the same message digest value
  • 13. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Message Digest
  • 14. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited One-way Bash Functions Message digests are also called one-way bash functions because they produce values that are difficult to invert, resistant to attack, mostly unique, and are widely distributed Message digest algorithms themselves are not used for encryption and decryption operations They are used in the creation of digital signatures, message authentication codes (MACs), and encryption keys from passphrases Message digest functions: – HMAC – MD2 – MD4 – MD5 – SHA – SHA-1
  • 15. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited MD5 The MD5 algorithm takes as input, a message of arbitrary length, and outputs a 128-bit fingerprint or message digest of the input The MD5 algorithm is intended for digital signature applications, where a large file is compressed in a secure manner before being encrypted with a private (secret) key under a public-key cryptosystem, such as RSA
  • 16. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited SHA (Secure Hash Algorithm) The SHA algorithm takes as input, a message of arbitrary length and outputs a 160-bit fingerprint or message digest of the input The algorithm is slightly slower than MD5, but the larger message digest makes it more secure against brute-force collision and inversion attacks
  • 17. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited SSL (Secure Sockets Layer) SSL stands for Secure Sockets Layer. SSL is a protocol developed by Netscape for transmitting private documents via the Internet SSL works by using a private- key to encrypt data which is transferred over the SSL connection SSL Protocol is an independent application protocol
  • 18. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited RC5 is a fast, symmetric block cipher designed by RSA Security in 1994 It is a parameterized algorithm with a variable block size, a variable key size, and a variable number of rounds. The key size is 128-bits RC6 is a block cipher based on RC5. Like RC5, RC6 is a parameterized algorithm where the block size, the key size, and the number of rounds are variable. The upper limit on the key size is 2040-bits RC5
  • 19. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited SSH (Secure Shell)
  • 20. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Government Access to Keys (GAK) Government Access to Keys (also known as key escrow) means that software companies will give copies of all keys, (or at least enough of the key that the remainder could be cracked) to the government The government promises that they will hold on to the keys in a secure way, and will only use them when a court issues a warrant to do so To the government, this issue is similar to the ability to wiretap phones
  • 21. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited RSA Challenge The RSA factoring challenge is an effort, sponsored by RSA Laboratories, to learn about the difficulty of factoring large numbers used in RSA keys A set of eight challenge numbers, ranging in size from 576-bits to 2048-bits, are given
  • 22. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited distributed.net http://www.distributed.net An attempt to crack RC5 encryption using a network of computers worldwide The client utility, when downloaded from distributed.net, runs the crack algorithm as a screensaver, and sends the results to the distributed.net connected servers The challenge is still running
  • 23. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Cleversafe Grid Builder http://www.cleversafe.com/ Cleversafe Grid Builder EN software subscriptions provide all the software that you need to build your own dispersed storage grid The 11 dispersed storage nodes can be spread across up to 11 servers for maximum security benefits Benefits of Building Your Own Grid: • Control your data within your own four walls based on your existing offices and infrastructure • Utilize the most innovative technology to reach the storage market in decades • Avoid expensive hardware costs, and use older storage devices you have around • Customize your implementation based on your environment • Create derivative works by changing source code to meet your storage needs and processes
  • 24. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited PGP (Pretty Good Privacy) Pretty Good Privacy (PGP) is a software package originally developed by Philip R. Zimmermann, which provides cryptographic routines for email, and file storage applications Zimmermann took existing cryptosystems and cryptographic protocols, and developed a program that can run on multiple platforms It provides message encryption, digital signatures, data compression, and email compatibility
  • 25. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Code Breaking: Methodologies The various methodologies used for code breaking are: • Using brute-force • Frequency analysis • Trickery and deceit • One-time pad
  • 26. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Cryptography Attacks Cryptography attacks are based on the assumption that the cryptanalyst has knowledge of the encrypted information There are seven types of Cryptography attacks: • Ciphertext-only attack • Known-plaintext attack • Chosen-plaintext • Adaptive chosen-plaintext attack • Chosen-ciphertext attack • Chosen-key attack • Rubber hose attack
  • 27. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Disk Encryption Disk encryption works similarly to text message encryption With the use of an encryption program for your disk, you can safeguard any information to burn onto the disk, and keep it from falling into the wrong hands Encryption for disks is useful when you need to send sensitive information through the mail
  • 28. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Hacking Tool: PGP Crack http://munitions.iglu.cjb.net/dolphin.cgi?action=render&category=0406 PGP crack is a program designed to brute force a conventionally encrypted file with a PGP, or a PGP secret key The file pgpfile cannot be ascii-armored. The file phraselist should be a file containing all of the passphrases that will be used to crack the encrypted file
  • 29. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Cracking S/MIME Encryption Using Idle CPU Time Tries to brute-force an S/MIME encrypted email message by translating an S/MIME encrypted message to RC2 format, and then trying all the possible keys to decrypt the message This brute-force utility comes in two forms: • Command line • Screen saver
  • 30. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited CypherCalc Is a full-featured, programmable calculator designed for multi-precision integer arithmetic It is intended for use in the design, testing, and analysis of cryptographic algorithms involving key exchanges, modular exponentiation, modular inverses, and Montgomery Math It has built-in GCD and SHA 1 tools, and a CRC tool that can generate CRC tables for your applications
  • 31. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Command Line Scriptor Automates file encryption/decryption, digital signing, and verification Sends files and email securely without any user intervention Ensures that all of the important data is secured without relying on user input Bulk deletes files at a pre-defined date and time Integrates cryptographic techniques into the existing applications Processes incoming secure files from any OpenPGP compliant application
  • 32. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Screenshot of Command Line Scriptor
  • 33. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited CryptoHeaven CryptoHeaven allows groups to send encrypted email, securely backup and share files, pictures, charts, business documents, and any other form of electronic media through a secure environment No third parties, including server administrators, government agencies, and others have access to the plain text version of the transmitted information Some of the features of the service include secure document storage, secure document sharing and distribution, secure message boards, secure email, and secure instant messaging
  • 34. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Summary Using Public Key Infrastructure (PKI), anyone can send a confidential message using public information, which can only be decrypted with a private-key in the sole possession of the intended recipient RSA encryption is widely used and is a de-facto encryption standard The MD5 algorithm is intended for digital signature applications, where a large file must be compressed securely before being encrypted SHA algorithm takes, as input, a message of arbitrary length and outputs a 160-bit message digest of the input Secure Sockets Layer, SSL is a protocol for transmitting private documents via the Internet RC5 is a fast block cipher designed by RSA Security SSH (Secure Shell) is a secure replacement for telnet and the Berkeley r-utilities, and provides an encrypted channel for logging into another computer over a network, executing commands on a remote computer, and moving files from one computer to another