Module 20: Cryptography
Module 20: Cryptography
Scenario
With the increasing adoption of the Internet for business and personal communication, securing sensitive information such as credit-card and personal identification numbers (PINs), bank account numbers, and private messages is becoming increasingly important, and yet, more difficult to achieve. Today’s information-based organizations extensively use the Internet for e-commerce, market research, customer support, and a variety of other activities. Thus, data security is critical to online businesses and privacy of communication.
Cryptography and cryptographic (“crypto”) systems help in securing data from interception and compromise during online transmissions. Cryptography enables one to secure transactions, communications, and other processes performed in the electronic world, and is additionally used to protect confidential data such as email messages, chat sessions, web transactions, personal data, corporate data, e-commerce applications, etc.
As an ethical hacker or penetration tester, you should suggest to your client proper encryption techniques to protect data, both in storage and during transmission. The labs in this module demonstrate the use of encryption to protect information systems in organizations.
Objectives
The objective of the lab is to use encryption to conceal data and perform other tasks that include, but is not limited to:
- Generate hashes and checksum files
 - Calculate the encrypted value of the selected file
 - Use encrypting/decrypting techniques
 - Perform file and data encryption
 - Create self-signed certificates
 - Perform email encryption
 - Perform disk encryption
 - Perform cryptanalysis
 
Overview of Cryptography
“Cryptography” comes from the Greek words kryptos, meaning “concealed, hidden, veiled, secret, or mysterious,” and graphia, “writing”; thus, cryptography is “the art of secret writing.”
Cryptography is the practice of concealing information by converting plain text (readable format) into cipher text (unreadable format) using a key or encryption scheme: it is the process of the conversion of data into a scrambled code that is sent across a private or public network.
There are two types of cryptography, determined by the number of keys employed for encryption and decryption:
Symmetric Encryption: Symmetric encryption (secret-key, shared-key, and private-key) uses the same key for encryption as it does for decryption
Asymmetric Encryption: Asymmetric encryption (public-key) uses different encryption keys for encryption and decryption; these keys are known as public and private keys
Lab Tasks
Ethical hackers or pen testers use numerous tools and techniques to perform cryptography to protect confidential data. Recommended labs that will assist you in learning various cryptography techniques include:
Encrypt the information using various cryptography tools
- Calculate one-way hashes using HashCalc
 - Calculate MD5 hashes using MD5 Calculator
 - Calculate MD5 hashes using HashMyFiles
 - Perform file and text message encryption using CryptoForge
 - Encrypt and decrypt data using BCTextEncoder
 
Create a self-signed certificate
- Create and use self-signed certificates
 
Perform email encryption
- Perform email encryption using RMail
 
Perform disk encryption
- Perform disk encryption using VeraCrypt
 - Perform disk encryption using BitLocker Drive Encryption
 - Perform disk encryption using Rohos Disk Encryption
 
Perform cryptanalysis using various cryptanalysis tools
- Perform cryptanalysis using CrypTool
 - Perform cryptanalysis using AlphaPeeler
 
Comments
Post a Comment