Skip to main content

Ethical Hacking Simplified. Cryptography continuation.

Asymmetric Encryption: This type of encryption was fully unveiled in in mid 1970s by Whitfield Diffie and Martin Hellman. This new technology solved the problem of using one key to encrypt and decrypt.


Asymmetric cryptography introduces the public key system into encryption, where the key that encrypt is known as the public key and the key that decrypt is known as private key. Who ever is part of the system is having two separate keys i.e. the public and his unique confidential private key. The public key can be access by the team mates but the private key is sorely to the assigned. Take for example, in an ATM (debit)  card, there is a some number on the card which anyone can have access to, but there is always a PIN(personal identification number) which is secret. If one possesses your debit card, he cannot make withdrawals through ATM machine why? Because he doesn't have your private key which is your PIN. Making this more secured than the symmetric metric. Take for example the serial number on your ATM card can be used as the PIN number, when a third person has access to your card, he definitely have sull access to your account! But mind you, you still have to keep your debit card secured, because it can be used fro online transactions even without your PIN! 

Both the public and the private keys can be used for encryption, but if one is used for encryption only the other can be used for decryption. If public key is used to encrypt data only the private key can be used to decrypt it and vice-versa.
Public keys has to be associated to the user in a trusted manner. Using PKI(public key infrastructure) anyone can send encrypt data, one thing is only the one with the private key can access the data. Example you can give you P.O box number to anyone send message, but only you can retrieve that message or document. Another advantage of PKI is, it meets the requirement for privacy and authentication since only the right guy can decrypt the data.

Who does it works?

Let me use the name Salim and Zainab. If Salim needs to send message to Zainab, he has to access her public key and encrypt the message. When the message reaches her. She will use her private key to decrypt the message. Here only Zainab can have access to that message since she is the only one who suppose to the keys to unlock or decrypt the data. If he uses his private key to encrupt the message, using digital signal became possible. So here his public key will act as private key thus making the message to be accessed only using his public key.
Signing an electronic message

When Salim want to send message to Zainab, after he created the message he have to do some mathematical computation against it and uses his and uses his private key to complete the operation. Upon arriving at his sweetheart she will verify if the message is from him by using his public key. If the key can reverse the message then its from salim if it cant? Its not from him.
Reference: Sybex CEH
to be continued

Comments

Popular posts from this blog

Powerful words from Steve Jobs on his sick bed

Powerful message. Steve Jobs’ Last Words - I reached the pinnacle of success in the business world. In others’ eyes, my life is an epitome of success. However, aside from work, I have little joy. In the end, wealth is only a fact of life that I am accustomed to. At this moment, lying on the sick bed and recalling my whole life, I realize that all the recognition and wealth that I took so much pride in, have paled and become meaningless in the face of impending death. In the darkness, I look at the green lights from the life supporting machines and hear the humming mechanical sounds, I can feel the breath of god of death drawing closer… Now I know, when we have accumulated sufficient wealth to last our lifetime, we should pursue other matters that are unrelated to wealth… Should be something that is more important: Perhaps relationships, perhaps art, perhaps a dream from younger days ... Non-stop pursuing of wealth will only turn a person into a twisted being, just l

iTunes Connect is down!

Something is wrong in Cupertino. A number of developers today turned to Twitter to complain that iTunes Connect, a hub for iOS and Mac software makers, was logging them into the wrong accounts.  The service appears to be matching log-ins with the wrong accounts, showing apps and usernames from completely different people. When developers try to access one of the apps, they receive an error message leading them back to their own account. iTunes Connect has since been taken offline as Apple’s engineers presumably set off to fix the problem. We’ve contacted Apple and will update if we hear back. Culled from:  The Next Web

How to Send SMS to any number anonymously

In this technology era, many of us want to send messages anonymously! the reasons might be maintaining privacy, franking etc. But many sees it as impossible! Today I'm going to take you through steps to send SMS/Text message without exposing your identity. This method is actually based on sending SMS using some online websites that will allow you to send SMS without entering any personal details. So just have a look on the websites to send free Anonymous SMS. List of Websites To Send Anonymous SMS To Any Number :- 1   Seasms.com This is the one of the best site that supports 160 character message to send to any number online and you will not need to register any personal details and can send free SMS to any of number. Must try this. 2   Spicesms.com This site only allows you to send SMS in india. The message service of this site is very fast as the message will be send instantly to the receiver end. 3   Smsti.in This website allows to send SMS in India onl