Wednesday, May 31, 2023

USE OF CRYPTOGRAPHY IN HACKING

WHAT IS CRYPTOGRAPHY?

The Cryptography is derived from the Greek words "Kryptos". This is the study of secure communication techniques that allow only the sender and recipient of a message to view it's contents of transforming information into nonhuman readable form or vice versa is called cryptography.

As we know that information plays a vital role in running of any business and organizations etc, sensitive details in the wrong hands can leads to loss of business.

Cryptography is the science of ciphering and deciphering messages.To secure communication organizations use cryptology to cipher information .

                            Or

Cryptography is a method of protecting information and communication through the use of codes so that only those whom the information is intended can read and process it.

In Computer Science, Cryptography refers to secure information and communication techniques derived from mathematical concepts , a set of rule based calculations called algorithm to transform message in ways the hard to readable for human.

This is one of the secure way of communications for a hacker with the help of virtual private network(VPN) like Tor Browser which is also very helpful to change the IP Address(Location of the sender ) for illegal purpose to perform crime in cyberspace . I will discuss in brief about the VPN .



How to Encrypt and Decrypt the text in Cryptography?

Open this website with the help of internert surfing for encryption-"http://wwwmd5online.org" 

Open the link for Decrypt the code text-"http://www.md5online.org/md5-decrypt.html"

Type whatever you want for encryption and it will crypt in the code form, copy that code and forward to the intended person whom you want for secure communication and then he/she will Decrypt in the real form.




               
       







More information


  1. Pentest Tools Tcp Port Scanner
  2. Pentest Tools List
  3. World No 1 Hacker Software
  4. Hacking Tools Pc
  5. Pentest Tools Github
  6. Hack Tools
  7. Hacking Tools Download
  8. Tools 4 Hack
  9. Pentest Tools For Android
  10. Top Pentest Tools
  11. Hack App
  12. Pentest Tools Alternative
  13. Wifi Hacker Tools For Windows
  14. Hacker Tools
  15. Hack Tools For Ubuntu
  16. Hack Tools For Pc
  17. Tools Used For Hacking
  18. Hacker Tools Free Download
  19. New Hack Tools
  20. Hack Tools Pc
  21. Hacker Tools Online
  22. Hack App
  23. Hacks And Tools
  24. Hacker Tools 2019
  25. Pentest Tools For Android
  26. Hacker Tools
  27. Hacker Techniques Tools And Incident Handling
  28. Hacker Tools Online
  29. Pentest Tools Linux
  30. How To Make Hacking Tools
  31. Pentest Tools For Android
  32. Hack Apps
  33. Hacker Tools 2020
  34. Underground Hacker Sites
  35. Hak5 Tools
  36. Hack Tools For Games
  37. How To Make Hacking Tools
  38. Hackrf Tools
  39. Termux Hacking Tools 2019
  40. Hack Tool Apk No Root
  41. Hacks And Tools
  42. Hacking Tools For Windows 7
  43. Hacker Tools For Mac
  44. Blackhat Hacker Tools
  45. What Is Hacking Tools
  46. Pentest Tools Kali Linux
  47. Hacks And Tools
  48. Hacker Tools
  49. Blackhat Hacker Tools
  50. What Is Hacking Tools
  51. Hack Tools 2019
  52. Hacking Tools Name
  53. Physical Pentest Tools
  54. Hacking Tools For Games
  55. Pentest Tools Port Scanner
  56. Hacker Tools Apk Download
  57. Hacking Tools Download
  58. Hacker Tool Kit
  59. Hacking Apps
  60. Top Pentest Tools
  61. Hack Tools 2019
  62. Hacking Tools Pc
  63. Hack Tools For Games

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.