# Cryptography Tutorial Study Material Short Notes with Examples in Hacking

Cryptography Tutorial Study Material Notes with Examples in Hacking:-In  this  cyberpoint9 tutorial we are going to describe about the  concept of CryptoGraphy in  ethical hacking cyber programming. And also we will describe that how can we use ethical hacking for our safety.This is the free ethical hacking tutorials: course for Beginners  And why we  use  ethical hacking  to make  more interactive and  secure for our daily life. Best Online Tutorial for ethical hacking.When ever we want to learn any thing the things become more earlier is somebody/tutorial/study material taught us through Examples. Here we have tried to describe each and every concept of  Ethickal and Cyber Security   in the light of cyberpoint9.com  best Hindi  Short tutorial using simple and best possible example. These examples are so simple that even a beginner who had never even heard about hacking and Cyber law can easily learn and understand How  the  Ethical Hacking works in our today’s Technical Field. This is  the best  tutorial/Study Material  very beneficial for beginners  as well as Professional. The Complete Ethical Hacking Course:Beginner to Advanced for Every One!

## What is Cryptography————

It is the process of converting a plain text into a cipher text(Encryption) using an algorithm and a key. And in the reverse order, Converting the cipher text into the plain text via same algorith and the key(Decryption).

Plain Text —> Hello Baby
Algorithm —-> Ceaser Cipher
Key —> +3
Cipher Text –> Khoor Edeb —-> Encryption
It is readable but it is not understandable.

Cipher Text –> Khoor Edeb
Algorithm —-> Ceaser Cipher
Key —> -3
Plain Text —> Hello Baby —> Decryption

DES –> Data Encryption Standard
Block Encryption Method.

### Salted Cryptography===================

We add some junk data at the random places or at some designated places in the cipher text.
A|a —> hack
B|b —> devil

www.encipher.it –> AES
Plain Text
———-
Hello All,
Let’s Have some bomb blast in Kashmiri Gate ISBT on 17th of July, 2018 at 2000 hours.
Note That, we are going to the same for Lucideus House, which in Okhla Industrial Phase 3, Plot number 15.
With Regards,
Edward Snowden.
Algorithm –> AES
Key —> lucideustechnology
Cipher Text (Encryption)
————————
EnCt24aa10d13d44a8c56eea0472c0e2724ae2d5745514aa10d13d44a8c56eea0472cW7RZ3foISAC
IyupJTFvVwZg98YNvb8NfIqiXW6ukSgCQESARD96FZx4Zh5B9RrHzUvxmxGLmZ706MSuM9sp6BJbI3su
waX9vf2QFd9PsEecFmoAr97tASGXH06KZxOPt5nivazniVFpOhHalG9zaQhLqoKgXw5Z3tnJ3guPR3Rm
OlgyLOiDWJmYzDTALjX1lmjTea8voUtDppzaLgZ4sSeH4y7kTJQVOpylc39mZoNcaAylpwWvcgb+OXYF
G7rXTlzhO7m49ySsi2ArkflRaJUo3+t+WuJrZnhfCcEhgemeeoVkPLyDS0k7X+dExFF9mRCaWs3WDlCE
=IwEmS

Plain Text (Decryption)
———————–
Hello All,
Let’s Have some bomb blast in Kashmiri Gate ISBT on 17th of July, 2018 at 2000 hours.
Note That, we are going to the same for Lucideus House, which in Okhla Industrial Phase 3, Plot number 15.
With Regards,
Edward Snowden.

Cryptoanalysis
Fiestal Ciper
Rail Fense Ciper
Hill Climbing
PlayFair Ciper

1. Public Key
2. Private Key

## =============

Is the process of hiding data in the plain sight. In other words, we hide the data behind an image, audio, video, application, text file, pdf file etc etc etc etc.

Image –> bhalu.jpg
Text –> Text.txt
Open command prompt in the same folder(Shift+right click) and type the following command
copy /b bhalu.jpg+Text.txt chotaBhalu.jpg
copy –> to copy one file into another
/b –> bind –> creat a new file
bhalu.jpg+Text.txt
first image and then text file
chotaBhalu.jpg –> new File

### Tools For Steganography

images –> quickstego
http://quickcrypto.com/free-steganography-software.html
Audio –> MP3Stegz
Video and Exe files —> Neo Hex Editor

## What is Hashes

They are method for converting our data into an encrypted form, in a hash form. The difference between hashes and cryptography is that, we can decipher or decrypt an cryptographic algorithm but we cannot decrypt or decipher the hash.
In the hash we can recover the hash. We will convert the words from the dictionary into a hash and we will map that hash with the original hash.
They are unique, they have a unique pattern.

1. Base 64
2. MD5
3. SHA512

Strings
=======

Base64
======
YWRtaW4=
YWRtaW5pc3RyYXRvcg==
cGFzc3dvcmQ=

MD5
===
21232f297a57a5a743894a0e4a801fc3
200ceb26807d6bf99fd6f4f0d1ca54d4
5f4dcc3b5aa765d61d8327deb882cf99

SHA256
======
8c6976e5b5410415bde908bd4dee15dfb167a9c873fc4bb8a81f6f2ab448a918
4194d1706ed1f408d5e02d672777019f4d5385c766a8c6ca8acba3167d36a7b9
5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8

Hashidentifier
==============
#hash-identifier
paste the hash
#hashid <hash_value>

### How is HashcatIt claimed to be the world’s fastest hash recovery tool. It works on both, CPU and GPUCPU –> Central Processing UnitGPU –> Graphical Processing UnitFor using hashcat, we need two different parameters.hash type —> mattack type —> a

Open the terminal and type
MD5
===
#hashcat -m 0 -a 3 /root/Desktop/md5 /usr/share/wordlist/rockyou.txt
#hashcat -m 0 -a 3 /root/Desktop/md5 /usr/share/wordlist/rockyou.txt –force
For Showing
#hashcat -m 0 -a 3 /root/Desktop/md5 /usr/share/wordlist/rockyou.txt –force –show

SHA256
======
#hashcat -m 1400 -a 3 /root/Desktop/sha256 /usr/share/wordlist/rockyou.txt –force
For Showing
#hashcat -m 1400 -a 3 /root/Desktop/sha256 /usr/share/wordlist/rockyou.txt –force –show

# Overview of Network Technology in Ethical Hacking With Examples

#### Overview of Network Technology in Ethical Hacking With Examples :  Click here

cryptography tutorial
basics
and network
security
course
why use the cryptography
where is used cryptography
what is crytpography
cryptographic protocol
cryptogrphy law
cryptography standards
cryptography modernization programm
definition of cryptography
means of cryptography
cryptography engineering
cryptography theory and practice
cryptography examples