Book of Guru HariHaraun
  • About the Author
  • đź“•Certifications
    • Certified Ethical Hacker (C|EH)(Practical)
      • Reconnaissance (Footprinting)
      • Scanning Networks
      • Enumeration
      • Vulnerability Analysis
      • System Hacking
      • Steganography
      • Sniffing
      • SQL Injection
      • Hacking Web Applications & Servers
      • Cloud Computing
      • Cryptography
      • The Final Note
Powered by GitBook
On this page
  • Introduction
  • Tools
  • Calculate One-way Hashes using HashClac
  • Calculate MD5 Hashes using MD5 Calculator
  • Calculate MD5 hashes for files using HashMyFiles
  • Perform File and Text Message Encryption using CryptoForge
  • Perform File Encryption using Advanced Encryption Package
  • Encrypt and Decrypt messages using BCText Encoder
  • Perform Disk Encryption Using VeraCrypt
  • Bitlocker
  • Rohos Disk Encryption
  • Cryptool

Was this helpful?

  1. Certifications
  2. Certified Ethical Hacker (C|EH)(Practical)

Cryptography

Welcome to the Cryptography module. This note will guide you thru all the methodologies that I used while preparing for the CEH (Practical) exam.

PreviousCloud ComputingNextThe Final Note

Last updated 3 years ago

Was this helpful?

Introduction

Cryptography is the science of protecting information by transforming it into a secure format. This process, called encryption, has been used for centuries to prevent handwritten messages from being read by unintended recipients. Today, cryptography is used to protect digital data. It is a division of computer science that focuses on transforming data into formats that cannot be recognized by unauthorized users.

An example of basic cryptography is an encrypted message in which letters are replaced with other characters. To decode the encrypted contents, you would need a grid or table that defines how the letters are transposed.

For example, the translation grid below could be used to decode "aHR0cHM6Ly90aGVndXJ1c2VjLmNvbS8" as "".

Tools

Calculate One-way Hashes using HashClac

  • You may use this tool to calculate the MD5 hashes

Calculate MD5 Hashes using MD5 Calculator

  • Use this tool to compare the hashes with other hashes

Calculate MD5 hashes for files using HashMyFiles

HashMyFiles is a small utility that allows you to calculate the MD5 and SHA1 hashes of one or more files in your system.

Perform File and Text Message Encryption using CryptoForge

Perform File Encryption using Advanced Encryption Package

Encrypt and Decrypt messages using BCText Encoder

Perform Disk Encryption Using VeraCrypt

VeraCrypt is an open-source utility for on-the-fly encryption. The software can create a virtual encrypted disk that works just like a regular disk but within a file. It can also encrypt a partition or the entire storage device with pre-boot authentication. VeraCrypt is a fork of the discontinued TrueCrypt project

  • Creating an encrypted VeraCrypt volume File

    • Open the application and click “Create Volume”.

    • tap on “Create an Encrypted File Container”.

    • Select a path where the volume has to be saved.

    • Now, mention the volume size.

    • Set a password for the encrypted volume file.

    • For file system format we can set as “FAT“ and cluster as “Default”.

  • Mounting the Encrypted file into a Volume

    • Select any volume of your choice.

    • Select the VeraCrypt volume created before to be added.

    • Select Mount and it may prompt for a password.

  • Uploading Files into VeraCrypt Virtual Encrypted Volume

    • Create/Copy/Move the files into the Volume which you choose for mounting.

    • Paste all your confidential files inside that virtual volume.

    • Once completed, open the VeraCrypt application and then press “Dismount”.

Bitlocker

BitLocker Drive Encryption is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers.

BitLocker provides the most protection when used with a Trusted Platform Module (TPM) version 1.2 or later. The TPM is a hardware component installed in many newer computers by the computer manufacturers. It works with BitLocker to help protect user data and to ensure that a computer has not been tampered with while the system was offline.

Rohos Disk Encryption

Cryptool

CrypTool is an open-source project that is a free e-learning software for illustrating cryptographic and cryptanalytic concepts. According to "Hakin9", CrypTool is worldwide the most widespread e-learning software in the field of cryptology. CrypTool implements more than 400 algorithms.

I strongly recommend you learn all these tools. At least Go through the tools.

đź“•
https://thegurusec.com
SlavaSoft HashCalc - Hash, CRC, and HMAC Calculator
MD5 Calculator
HashMyFiles: Calculate MD5/SHA1/CRC32 hash of filesNirSoft
Logo
CrypTool PortalCrypTool Portal
Logo
File Encryption Software
Encryption Software | Data Encryption Software
Logo
Encrypt Text with BCTextEncoder | Jetico
Rohos Disk EncryptionRohos
BitLocker (Windows 10) - Windows securitydocsmsft
Official Link of Microsoft
VeraCrypt - Free Open source disk encryption with strong security for the Paranoid
Logo
Logo
Logo
Logo