Module 20: Cryptography

 

Module 20: Cryptography

Scenario

With the increasing adoption of the Internet for business and personal communication, securing sensitive information such as credit-card and personal identification numbers (PINs), bank account numbers, and private messages is becoming increasingly important, and yet, more difficult to achieve. Today’s information-based organizations extensively use the Internet for e-commerce, market research, customer support, and a variety of other activities. Thus, data security is critical to online businesses and privacy of communication.

Cryptography and cryptographic (“crypto”) systems help in securing data from interception and compromise during online transmissions. Cryptography enables one to secure transactions, communications, and other processes performed in the electronic world, and is additionally used to protect confidential data such as email messages, chat sessions, web transactions, personal data, corporate data, e-commerce applications, etc.

As an ethical hacker or penetration tester, you should suggest to your client proper encryption techniques to protect data, both in storage and during transmission. The labs in this module demonstrate the use of encryption to protect information systems in organizations.

Objectives

The objective of the lab is to use encryption to conceal data and perform other tasks that include, but is not limited to:

  • Generate hashes and checksum files
  • Calculate the encrypted value of the selected file
  • Use encrypting/decrypting techniques
  • Perform file and data encryption
  • Create self-signed certificates
  • Perform email encryption
  • Perform disk encryption
  • Perform cryptanalysis

Overview of Cryptography

“Cryptography” comes from the Greek words kryptos, meaning “concealed, hidden, veiled, secret, or mysterious,” and graphia, “writing”; thus, cryptography is “the art of secret writing.”

Cryptography is the practice of concealing information by converting plain text (readable format) into cipher text (unreadable format) using a key or encryption scheme: it is the process of the conversion of data into a scrambled code that is sent across a private or public network.

There are two types of cryptography, determined by the number of keys employed for encryption and decryption:

  • Symmetric Encryption: Symmetric encryption (secret-key, shared-key, and private-key) uses the same key for encryption as it does for decryption

  • Asymmetric Encryption: Asymmetric encryption (public-key) uses different encryption keys for encryption and decryption; these keys are known as public and private keys

Lab Tasks

Ethical hackers or pen testers use numerous tools and techniques to perform cryptography to protect confidential data. Recommended labs that will assist you in learning various cryptography techniques include:

  1. Encrypt the information using various cryptography tools

    • Calculate one-way hashes using HashCalc
    • Calculate MD5 hashes using MD5 Calculator
    • Calculate MD5 hashes using HashMyFiles
    • Perform file and text message encryption using CryptoForge
    • Encrypt and decrypt data using BCTextEncoder
  2. Create a self-signed certificate

    • Create and use self-signed certificates
  3. Perform email encryption

    • Perform email encryption using RMail
  4. Perform disk encryption

    • Perform disk encryption using VeraCrypt
    • Perform disk encryption using BitLocker Drive Encryption
    • Perform disk encryption using Rohos Disk Encryption
  5. Perform cryptanalysis using various cryptanalysis tools

    • Perform cryptanalysis using CrypTool
    • Perform cryptanalysis using AlphaPeeler

Comments

Popular posts from this blog

Lab 7: Perform Enumeration using Various Enumeration Tools

Lab 1: Perform S3 Bucket Enumeration using Various S3 Bucket Enumeration Tools

Lab 2: Perform Vulnerability Assessment using Various Vulnerability Assessment Tools