Hacking Articles is an article/guides about basic hacking and any topics related to Hacking/Technology.
This was written by Rovic Balingbing a.k.a. Baby Esue, it consists of 30 parts, this "Hacking Articles" consists of some articles, guides, tutor...
[Disclaimer: The content of this article is for educational purposes only and some of the information in this article was the author's opinions and experiences. It was written to express the opinions and experiences of the author and to share some knowledge about Cryptography.]
This one is connected to Hacking Articles Part 3 which is about Cryptovirology. Well medyo new word talaga ito sa ibang mga tao pero sa mga elite hackers hindi na siguro right? Okay, ipapaliwanag ko lang naman kung ano nga ba ang cryptography at ang mga nakapaloob dito?
"I am Rovic, a Deep Web Researcher and Knowledge is my Power!"
Oops! This image does not follow our content guidelines. To continue publishing, please remove it or upload a different image.
Ano nga ba ang cryptography?
Ayon sa Uncensored Hidden Wiki, this is the art and science of hiding data in plain sight. It is also the art and science of stealing data hidden in plain sight. So siguro talagang magagaling ang mga gumagawa ng cryptography no?
I have a question, gumawa ka na ba dati ng secret codes kasama yung kalaro mo dati nung bata ka pa? Maaaring number code yan na may katumbas na alphabet, o kaya naman chart na kayo lang ang nakakapagtranslate. Hindi mo ba alam na sa paggawa mo nun ay nagagawa mo na ang simple form ng Cryptography.
Cryptography is the method kung saan ang "plaintext" ay ineencrpty para hindi mabasa ng ibang tao. Plaintext is the original one before encrypting it to make it unreadable to other people. Simple lang naman ang dahilan kaya hindi siya mabasa ng ibang tao at ito ay dahil gumamit sila ng isang key or code na siyang nagsilbing actual password (or whatnot) nito.
What are the Different types of encryption schemes?
1. One-Way encryptions algorithms
-There are certain mathematical/cryptographical algorithms that will encrypt a string of text/numbers using a complex equation. But hindi mo pwedeng baliktarin anf equation ulit.
Ang uri na ito ng algorithms ay ginagamit kapag may isang tao na kailangan magkumpara ng text, tulad na lamang ng password validation checks. Crypt(), and Unix password validation routine ay gumagana tulad nito. Ang password ay ginagamit para maencrypt ang isang plaintext string ng 0's. Then, para maverifiy ang password, susubukan ng computer na iencrypt ang parehas na string ng plaintext kasama ang password na tinype mo. Kapag match o parehas ito sa orihinal na encrypted text, then ang password na yun ay valid.
2. One-Time Pad
- isang mahabang string ng random numbers ay nagagawa o nagegenerate. Ang mga messsages ay hindi pwedeng maging kasinghaba ng string na puno ng random numbers pero pwede itong mas maging maikli.
The text is encrypted by XOR'ing the bits in relation to the random string of numbers. Bit by bit. So, anyone not knowing the original key wouldn't know whether the string, "123" was really "456" or "789" because in fact the originator and the intended receiver know it's really, "012" (wrap around 9->0). This is the best explanation I can come up with for this. It's a proven technique and is considered quite secure.
3. Single-Key Encryption
- Ito ang madalas na sinasalita ng mga non-crypto na tao at naiintindihan nila it as an encryption system. Enter one string of characters (or whatnot - The Key) at iencrypt anf plaintext gamit ang key na ito.
4. Public-Key Encryption
- This is gaining a large following during the time of this writing with such programs as RIPEM, PGP, and the availability of RSAREF, isang RSA Public Key Algorithm library.
Ang RIPEM at PGP (Pretty Goog Privacy by Phil Zimmerman) ay parehang example ng RSA Public Key systems.
2 distinct partsto a public key system
* PUBLIC Key is given out to everyone you know who would want to send you an encrypted message.
*PRIVATE Key is when you want to keep secret and do not disclose to anyone.
Example:
How it works: User A (Iskra) wants to send a message to User B (B00gerHed) so Iskra encrypts a message to B00gerHed using BH's public key that was given out at the last HoHoCon. No one except B00gerHed has the private key to decrypt the message. So he takes his private key, the counterpart to his public key, and decrypts the message sent to him by Iskra. Viola. He now sees that the new red boxes are no longer working because AT&T has cinched up the timing checks. However, Veggie (User C) has intercepted the encrypted message and is trying to figure out what they are talking about. But because he doesn't have B00gerHed's private key, he cannot read it. A successful use of public key encryption.
P.S. Hope You like it guys, madali lang naman siyang intindihin eh di tulad nung dalawang nauna :D ... BTW Keep on Following us and Supporting us..