Ethical Hacking and
Countermeasures
Version 6
d l
Mo u e XXV
Cryptography
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.informationweek.com/
Scenario
Larry was working on a high-end project. He was expecting a promotion
for his good performance. But he was disappointed to see that the
members of the team whose performances were below par were promoted
while he was ignored. In a fit of rage, he quit his job. He searched for a job
in another company and got a good offer.
While quitting he had decided that he would teach his project manager a
lesson. He used an encryption tool TrueCrypt and encrypted the whole
directory with password protection where he had stored his part of work.
Can the information Larry encrypted be retrieved?
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Objective
This module will familiarize you with:
• Cryptography
• Encryption and Decryption
• Cryptographic Algorithms
• RSA (Rivest Shamir Adleman)
• Data Encryption Standard (DES)
• RC4, RC5, RC6, Blowfish
• Message Digest Functions
• One way Bash Functions
-
• MD5
• SHA
• Algorithms and Security
• Government Access to Keys (GAK)
• Digital Signature
• Cryptography tools
• Code Breaking: Methodologies
• Cryptanalysis
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Cryptography Attacks
• Use Of Cryptography
Module Flow
Message Digest
Functions
Digital Signature
Cryptography
Encryption and
Decryption
One-Way Bash
Functions
Cryptography tools
Cryptographic
Algorithms
Code Breaking
Methodologies
MD5 Algorithm
RSA
SHA Algorithm
Cryptanalysis
Algorithms and
Security
DES
Cryptography Attacks
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
RC4, RC5, RC6,
Blowfish
Government Access to
Keys
Use of Cryptography
Cryptography
Cryptography is an art of writing text or data in secret code
It encrypts the plain text data