Thursday, August 20, 2020

USE OF CRYPTOGRAPHY IN HACKING

WHAT IS CRYPTOGRAPHY?

The Cryptography is derived from the Greek words "Kryptos". This is the study of secure communication techniques that allow only the sender and recipient of a message to view it's contents of transforming information into nonhuman readable form or vice versa is called cryptography.

As we know that information plays a vital role in running of any business and organizations etc, sensitive details in the wrong hands can leads to loss of business.

Cryptography is the science of ciphering and deciphering messages.To secure communication organizations use cryptology to cipher information .

                            Or

Cryptography is a method of protecting information and communication through the use of codes so that only those whom the information is intended can read and process it.

In Computer Science, Cryptography refers to secure information and communication techniques derived from mathematical concepts , a set of rule based calculations called algorithm to transform message in ways the hard to readable for human.

This is one of the secure way of communications for a hacker with the help of virtual private network(VPN) like Tor Browser which is also very helpful to change the IP Address(Location of the sender ) for illegal purpose to perform crime in cyberspace . I will discuss in brief about the VPN .



How to Encrypt and Decrypt the text in Cryptography?

Open this website with the help of internert surfing for encryption-"http://wwwmd5online.org" 

Open the link for Decrypt the code text-"http://www.md5online.org/md5-decrypt.html"

Type whatever you want for encryption and it will crypt in the code form, copy that code and forward to the intended person whom you want for secure communication and then he/she will Decrypt in the real form.




               
       







Continue reading

  1. Hacker Tools Free Download
  2. How To Install Pentest Tools In Ubuntu
  3. Hacker Tools Apk Download
  4. Install Pentest Tools Ubuntu
  5. Hack Tools For Ubuntu
  6. Hacking Tools Pc
  7. Hacker Tools Free
  8. What Is Hacking Tools
  9. Hack Tools 2019
  10. Hacker Tools List
  11. Hacker Tools For Pc
  12. Growth Hacker Tools
  13. Wifi Hacker Tools For Windows
  14. Pentest Tools Kali Linux
  15. Best Hacking Tools 2019
  16. Black Hat Hacker Tools
  17. Hack App
  18. Hacking Tools 2019
  19. Hacking Tools 2020
  20. Hack Rom Tools
  21. Android Hack Tools Github
  22. Hack Tools
  23. Growth Hacker Tools
  24. Hacker Tools For Pc
  25. Pentest Recon Tools
  26. Termux Hacking Tools 2019
  27. Pentest Tools Free
  28. Hacker Tools For Mac
  29. Physical Pentest Tools
  30. What Is Hacking Tools
  31. Pentest Tools Github
  32. Hack Tools For Pc
  33. Hack And Tools
  34. What Are Hacking Tools
  35. Hack Rom Tools
  36. Top Pentest Tools
  37. Hack Rom Tools
  38. How To Install Pentest Tools In Ubuntu
  39. Hacking Tools 2020
  40. Hacker Tools For Pc
  41. Black Hat Hacker Tools
  42. Pentest Tools Url Fuzzer
  43. Hacking Tools 2020
  44. Growth Hacker Tools
  45. Pentest Tools Android
  46. Hacker Tools 2019
  47. Pentest Tools Subdomain
  48. Hacker Tools List
  49. Hack Tool Apk No Root
  50. Pentest Tools Alternative
  51. Hacking Tools Software
  52. Pentest Tools Website
  53. Pentest Tools Linux
  54. Easy Hack Tools
  55. Hacking Tools Online
  56. Hacker Tools Github
  57. Pentest Reporting Tools
  58. Pentest Tools Subdomain
  59. Nsa Hack Tools
  60. Pentest Tools For Ubuntu
  61. Pentest Tools For Mac
  62. Pentest Tools Github
  63. Hacker Tools Free Download
  64. Pentest Tools Linux
  65. Pentest Tools Framework
  66. Physical Pentest Tools
  67. Pentest Tools Free
  68. Hacking Tools For Pc
  69. Hacker Security Tools
  70. Pentest Tools Website Vulnerability
  71. Hacker Search Tools
  72. Hack Apps
  73. Hack Tools For Windows
  74. Hacker Tools Linux
  75. Usb Pentest Tools
  76. Hacking Tools Windows
  77. Top Pentest Tools
  78. Computer Hacker
  79. Hak5 Tools
  80. Hack Tools Online

No comments:

Post a Comment