Title: Domain 9 of CEH: Cryptography
1Domain 9 of CEH Cryptography
www.infosectrain.com sales_at_infosectrain.com
2www.infosectrain.com sales_at_infosectrain.com
3- Domains of CEH
- Information Security and Ethical Hacking
Overview-6 - Reconnaissance Techniques-21
- System hacking phases and Attack Techniques-17
- Network and perimeter hacking-14
- Web application hacking-16
- Wireless network hacking-6
- Mobile platform, IoT, and OT hacking-8
- Cloud Computing-6
- Cryptography-6
www.infosectrain.com sales_at_infosectrain.com
4www.infosectrain.com sales_at_infosectrain.com
5We will discuss the ninth domain of CEH, which is
Cryptography. What is cryptography? Cryptograph
y is a technique through which we can convert
plain text into ciphertext and can convert the
ciphertext into plain text. Didnt get my point?
No worries! Let me give you a simple example.
www.infosectrain.com sales_at_infosectrain.com
6Assume there are two friends staying in different
corners of the world. And, one of them (lets say
Bob) is sending a piece of confidential
information to another (lets say, Alexa). Now,
in between, some attackers may access this
information to avoid this by Using a key, Bob may
convert the plain text (original message) into
ciphertext (a combination of random numbers and
alphabets). Now, even if the attacker finds the
message, he will not understand it. And finally,
after receiving the message, Alexa can use the
key to convert the ciphertext into plaintext.
This entire process of converting the texts to
maintain their secrecy is called cryptography.
www.infosectrain.com sales_at_infosectrain.com
7As shown in the figure, the original message is
1065256 this message is applied to an encryption
key. This key is used in the encryption algorithm
by which the message is converted in a ciphertext
(unreadable format), This ciphertext will be sent
across the network to the other end of the world.
The other person for whom the message is sent
will use a decryption key and ciphertext as a
parameter of the decryption algorithm and get the
original message (1065256). Keys? What keys? Is
this your question? Then go further.
www.infosectrain.com sales_at_infosectrain.com
8- Keys
- In cryptography, keys are strings of characters
(combinations of letters, numbers, and symbols)
used in an encryption algorithm for altering data
so that it appears random. Just like physical
keys, these keys also lock (encrypt) the data,
and only someone with the correct key can unlock
(decrypt) the data. - Objectives of cryptography
- Cryptography concentrates on four different
objectives. - Non-repudiation This term refers to a message
that can never be retracted by the sender or
taken back. - Confidentiality Private communications are
protected by confidentiality, ensuring the
intended recipient can only read the message
after it has been decrypted. - Authenticity Authenticity helps ensure that both
senders and recipients can verify each others
identities and that the intended recipients have
received the message. - Integrity Integrity is the ability to ensure
that the information in a message cannot be
modified while it is being stored or transported.
www.infosectrain.com sales_at_infosectrain.com
9Types of Cryptography Symmetric key
cryptography Symmetric key cryptography or
symmetric encryption is an algorithm for
cryptography that utilizes the same cryptographic
key for both the plaintexts encryption plus the
ciphertexts decryption. The keys may be related,
or there may be a slight variation between the
two keys.
www.infosectrain.com sales_at_infosectrain.com
10Asymmetric key cryptography Asymmetric
cryptography, also called public-key
cryptography, is a process that encrypts and
decrypts a message with two related keys, one
public and one private, to prevent unauthorized
access or use of confidential information.
www.infosectrain.com sales_at_infosectrain.com
11- The importance of cryptography
- Privacy Whether we are talking about the digital
or physical worlds, privacy is all we care about.
Im not sure about the physical world, but
cryptography can give us privacy in the digital
universe. By encrypting our data, we ensure that
only legitimate users can view it, and hackers,
cybercriminals, internet providers, and even
government agencies cannot access our data. - Authentication In cryptography, we scramble our
original data using a random passcode, called an
encryption key, in order to protect it. Using
this key eliminates the possibility that others
will access your data. Sometimes hackers pretend
to be authorized users in order to gain access.
So, making the encryption key authenticated will
protect your data.
www.infosectrain.com sales_at_infosectrain.com
12CEH with InfosecTrain InfosecTrain is one of the
leading training providers with a pocket-friendly
budget. We invite you to join us for an
unforgettable journey with industry experts to
gain a better understanding of the Certified
Ethical Hacker course. Courses can be taken as
live instructor-led sessions or as self-paced
courses, allowing you to complete your training
journey at your own convenience.
www.infosectrain.com sales_at_infosectrain.com
13About InfosecTrain
- Established in 2016, we are one of the finest
Security and Technology Training and Consulting
company - Wide range of professional training programs,
certifications consulting services in the IT
and Cyber Security domain - High-quality technical services, certifications
or customized training programs curated with
professionals of over 15 years of combined
experience in the domain
www.infosectrain.com sales_at_infosectrain.com
14Our Endorsements
www.infosectrain.com sales_at_infosectrain.com
15Why InfosecTrain
Global Learning Partners
Access to the recorded sessions
Certified and Experienced Instructors
Flexible modes of Training
Tailor Made Training
Post training completion
www.infosectrain.com sales_at_infosectrain.com
16Our Trusted Clients
www.infosectrain.com sales_at_infosectrain.com
17(No Transcript)
18Contact us
Get your workforce reskilled by our certified and
experienced instructors!
IND 1800-843-7890 (Toll Free) / US 1
657-221-1127 / UK 44 7451 208413
sales_at_infosectrain.com
www.infosectrain.com