Domain 9 of CEH: Cryptography - PowerPoint PPT Presentation

About This Presentation
Title:

Domain 9 of CEH: Cryptography

Description:

Cryptography is a technique through which we can convert plain text into ciphertext and can convert the ciphertext into plain text. Didn’t get my point? No worries! Let me give you a simple example. – PowerPoint PPT presentation

Number of Views:54

less

Transcript and Presenter's Notes

Title: Domain 9 of CEH: Cryptography


1
Domain 9 of CEH Cryptography
www.infosectrain.com sales_at_infosectrain.com
2
www.infosectrain.com sales_at_infosectrain.com
3
  • Domains of CEH
  • Information Security and Ethical Hacking
    Overview-6
  • Reconnaissance Techniques-21
  • System hacking phases and Attack Techniques-17
  • Network and perimeter hacking-14
  • Web application hacking-16
  • Wireless network hacking-6
  • Mobile platform, IoT, and OT hacking-8
  • Cloud Computing-6
  • Cryptography-6

www.infosectrain.com sales_at_infosectrain.com
4
www.infosectrain.com sales_at_infosectrain.com
5
We will discuss the ninth domain of CEH, which is
Cryptography. What is cryptography? Cryptograph
y is a technique through which we can convert
plain text into ciphertext and can convert the
ciphertext into plain text. Didnt get my point?
No worries! Let me give you a simple example.




www.infosectrain.com sales_at_infosectrain.com
6
Assume there are two friends staying in different
corners of the world. And, one of them (lets say
Bob) is sending a piece of confidential
information to another (lets say, Alexa). Now,
in between, some attackers may access this
information to avoid this by Using a key, Bob may
convert the plain text (original message) into
ciphertext (a combination of random numbers and
alphabets). Now, even if the attacker finds the
message, he will not understand it. And finally,
after receiving the message, Alexa can use the
key to convert the ciphertext into plaintext.
This entire process of converting the texts to
maintain their secrecy is called cryptography.




www.infosectrain.com sales_at_infosectrain.com
7




As shown in the figure, the original message is
1065256 this message is applied to an encryption
key. This key is used in the encryption algorithm
by which the message is converted in a ciphertext
(unreadable format), This ciphertext will be sent
across the network to the other end of the world.
The other person for whom the message is sent
will use a decryption key and ciphertext as a
parameter of the decryption algorithm and get the
original message (1065256). Keys? What keys? Is
this your question? Then go further.
www.infosectrain.com sales_at_infosectrain.com
8
  • Keys
  • In cryptography, keys are strings of characters
    (combinations of letters, numbers, and symbols)
    used in an encryption algorithm for altering data
    so that it appears random. Just like physical
    keys, these keys also lock (encrypt) the data,
    and only someone with the correct key can unlock
    (decrypt) the data.
  • Objectives of cryptography
  • Cryptography concentrates on four different
    objectives.
  • Non-repudiation This term refers to a message
    that can never be retracted by the sender or
    taken back.
  • Confidentiality Private communications are
    protected by confidentiality, ensuring the
    intended recipient can only read the message
    after it has been decrypted.
  • Authenticity Authenticity helps ensure that both
    senders and recipients can verify each others
    identities and that the intended recipients have
    received the message.
  • Integrity Integrity is the ability to ensure
    that the information in a message cannot be
    modified while it is being stored or transported.





www.infosectrain.com sales_at_infosectrain.com
9
Types of Cryptography Symmetric key
cryptography Symmetric key cryptography or
symmetric encryption is an algorithm for
cryptography that utilizes the same cryptographic
key for both the plaintexts encryption plus the
ciphertexts decryption. The keys may be related,
or there may be a slight variation between the
two keys.




www.infosectrain.com sales_at_infosectrain.com
10
Asymmetric key cryptography Asymmetric
cryptography, also called public-key
cryptography, is a process that encrypts and
decrypts a message with two related keys, one
public and one private, to prevent unauthorized
access or use of confidential information.




www.infosectrain.com sales_at_infosectrain.com
11
  • The importance of cryptography
  • Privacy Whether we are talking about the digital
    or physical worlds, privacy is all we care about.
    Im not sure about the physical world, but
    cryptography can give us privacy in the digital
    universe. By encrypting our data, we ensure that
    only legitimate users can view it, and hackers,
    cybercriminals, internet providers, and even
    government agencies cannot access our data.
  • Authentication In cryptography, we scramble our
    original data using a random passcode, called an
    encryption key, in order to protect it. Using
    this key eliminates the possibility that others
    will access your data. Sometimes hackers pretend
    to be authorized users in order to gain access.
    So, making the encryption key authenticated will
    protect your data.





www.infosectrain.com sales_at_infosectrain.com
12
CEH with InfosecTrain InfosecTrain is one of the
leading training providers with a pocket-friendly
budget. We invite you to join us for an
unforgettable journey with industry experts to
gain a better understanding of the Certified
Ethical Hacker course. Courses can be taken as
live instructor-led sessions or as self-paced
courses, allowing you to complete your training
journey at your own convenience.




www.infosectrain.com sales_at_infosectrain.com
13
About InfosecTrain
  • Established in 2016, we are one of the finest
    Security and Technology Training and Consulting
    company
  • Wide range of professional training programs,
    certifications consulting services in the IT
    and Cyber Security domain
  • High-quality technical services, certifications
    or customized training programs curated with
    professionals of over 15 years of combined
    experience in the domain

www.infosectrain.com sales_at_infosectrain.com
14
Our Endorsements
www.infosectrain.com sales_at_infosectrain.com
15
Why InfosecTrain
Global Learning Partners
Access to the recorded sessions
Certified and Experienced Instructors
Flexible modes of Training
Tailor Made Training
Post training completion
www.infosectrain.com sales_at_infosectrain.com
16
Our Trusted Clients
www.infosectrain.com sales_at_infosectrain.com
17
(No Transcript)
18
Contact us
Get your workforce reskilled by our certified and
experienced instructors!
IND 1800-843-7890 (Toll Free) / US 1
657-221-1127 / UK 44 7451 208413
sales_at_infosectrain.com
www.infosectrain.com
Write a Comment
User Comments (0)
About PowerShow.com