Cryptography for Dummies (2024)

Become familiar with cryptography

Cryptography for Dummies (2)

Task 1 Intro

Cryptography is a big topic. We are going to cover the basics, to give you a basic understanding.

It is used by a wide range of applications, almost everywhere in the internet.

Why we need cryptography?

Without encryption communications over the internet will be very insecure, and it would be very easy for someone to see your data. Fortunately this isn’t true, and almost all of the data you get/send over the internet is encrypted and cannot be seen in plain text by someone who got access to it. Now let’s look into cryptography in more detail.

Answer the questions below

Q. I understand why cryptography is important!
Ans: No Ans Needed

Task 2 Types of cryptography

There are two types of cryptography :

  • Symmetric
  • Asymmetric

What is symmetric cryptography?

Let’s say Alice wants to send message to Bob, but she doesn’t want to send the message in plain text because anyone can read it.

She has a recipe how to mess up the letters in a way that no one can understand what it means(that is called encryption). Bob has the same recipe but he uses it to order them so it will become readable again(that is called decryption), and he will understand what Alice wrote. The recipe in cryptography is called a key. In symmetric cryptography both users have the same key to encrypt and decrypt the messages.

What is asymmetric cryptography?

In asymmetric cryptography the encryption and decryption keys are different. The encryption key can be used only for encryption, not for decryption and vice versa. The encryption key is called Public key and the decryption key is called Private key.

Why is asymmetric cryptography used?

Well..because it’s more secure! If you are using symmetric cryptography and someone takes your key he can encrypt and decrypt messages that you send. While in asymmetric cryptography he can’t decrypt the messages you encrypted with the public key. Only the holder of the Private key can decrypt them. Let’s give an example :

Alice wants to talk to Google

Google gives Alice the Public key.

Alice encrypts her message with the public key and sends it to Google.

Google decrypts the message with his private key and sends back what Alice wanted.

And that’s how the conversation goes…

Note : Symmetric cryptography is faster than asymmetric, but asymmetric is more secure.

Now let’s see what you’ve learned!

Answer the questions below

Q. What type of cryptography is more secure?

Ans: asymmetric

Q. What type of cryptography is faster?

Ans:symmetric

Q. What type of cryptography will a Bank site use?

Ans:asymmetric

Q. What will you use to encrypt your messages in asymmetric cryptography?

Ans:public key

Q. What will you use to decrypt messages in asymmetric cryptography?

Ans:private key

Q. Does symmetric cryptography use two different keys for encryption/decryption? (aye/nay

Ans:nay

Task 3 What is a hash?

Hashes are a long strings of letters and numbers generated by hashing algorithms. They take plain text and make it a hash.

The important thing about hashes is that they are not reversible. There’s no way to decrypt/decode a hash.

Cryptography for Dummies (3)

Popular hashing algorithms are : MD5 (Message Digest 5) and SHA (Secure Hash Algorithm).

That’s how the word “hello” looks as MD5 hash : 5d41402abc4b2a76b9719d911017c592

What are hashes used for?

The most popular use of hashes is for file identification and storing sensitive data, like passwords. When you create an account on a website your password is converted to hash and this hash is stored in the server’s database. So when you login the password that you type in will be converted to a hash, the server will take it and compare it with the hash in it’s database, if it’s the same that means your password is correct and the server will let you in.

MD5 hashes are also used to ensure the data integrity of files. Because the MD5 hashing algorithm always produces the same output for the same given input, it can be used to compare a hash of the source file with a newly created hash of the destination file to check that it is intact and unmodified.

There are plenty of other hashing algorithms out there, but this room is intended for beginners so we’re not going to cover them here.

Answer the questions below

Q. I understand what are hashes!

Ans: No Ans Needed

Q. What’s the MD5 hash of “hashes are cool”?

Ans: f762d32e3c160900d94b683e927555b9

Cryptography for Dummies (4)

Q. What does MD5 stand for?

Ans: Message Digest 5

Q. Who created MD5?

Ans: Ronald Rivest

Task 4 Decoding/encoding

There’s difference between encoding and encrypting. Let’s say you have an encrypted file, the only way to decrypt it is using key. While encoded data can be decoded immediately, without keys. It’s NOT a form of encryption, it just a way of representing data.

A very popular encoding is Base64. Here’s how “hi there” looks with Base64 encoding : aGkgdGhlcmU=

Answer the questions below

Q.Encode the string “cryptographyisuseful” with Base64

Ans: Y3J5cHRvZ3JhcGh5aXN1c2VmdWw=

Cryptography for Dummies (5)

Q. Decode the string “dGhlIHNlY3JldCB3b3JkIGlzIDogd2F0ZXJtZWxvbg==”. What’s the secret word?

Ans: watermelon

Cryptography for Dummies (6)

Task 5 Thanks for reading!

Thanks for completing my room, if you are interested in cryptography and want to learn more I suggest you to complete the Cryptography rooms from TryHackMe. They cover more topics in cryptography.

Answer the questions below

Q. Thanks for reading!

Ans: No Ans Needed

Thanks to my guru
Sarath G

Cryptography for Dummies (2024)
Top Articles
Credit Card Machine for Processing Payments | Square Terminal
2.4 The Consequences of Poverty – Social Problems
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Free Atm For Emerald Card Near Me
Craigslist Mexico Cancun
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Doby's Funeral Home Obituaries
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Select Truck Greensboro
Things To Do In Atlanta Tomorrow Night
Non Sequitur
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Craigslist In Flagstaff
Shasta County Most Wanted 2022
Energy Healing Conference Utah
Testberichte zu E-Bikes & Fahrrädern von PROPHETE.
Aaa Saugus Ma Appointment
Geometry Review Quiz 5 Answer Key
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Pixel Combat Unblocked
Cvs Sport Physicals
Mercedes W204 Belt Diagram
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Facebook Marketplace Marrero La
Nobodyhome.tv Reddit
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hampton In And Suites Near Me
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Bedbathandbeyond Flemington Nj
Otter Bustr
Selly Medaline
Latest Posts
Article information

Author: Rev. Leonie Wyman

Last Updated:

Views: 5374

Rating: 4.9 / 5 (59 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Rev. Leonie Wyman

Birthday: 1993-07-01

Address: Suite 763 6272 Lang Bypass, New Xochitlport, VT 72704-3308

Phone: +22014484519944

Job: Banking Officer

Hobby: Sailing, Gaming, Basketball, Calligraphy, Mycology, Astronomy, Juggling

Introduction: My name is Rev. Leonie Wyman, I am a colorful, tasty, splendid, fair, witty, gorgeous, splendid person who loves writing and wants to share my knowledge and understanding with you.