Results 1 to 2 of 2

Thread: The Basics of Cryptography

  1. #1


    The Basics of Cryptography

    by tHe mAnIaC

    contact me at: dancho@mbox.digsys.bg

    maniac@forbidden.net-security.org

    16.11.1999

    |=|=|=|=|=|=|=|A=|N=|A=|R=|C=|H=|Y=|=|R=|U=|L=|E=|S|=|=|=|=|=|=|=|=|=|



    This guide is for educational purposes only I do not take any responsibility about anything

    happen after reading the guide. I'm only telling you how to do this not to do it. It's your decision.

    If you want to put this text on your Site/FTP/Newsgroup or anything else you can do it but don't

    change anything without the permission of the author.

    <--=--=--=--=--=--=--=--=>

    A word from the author:



    I hope you like my texts and find them useful.

    If you have any problem or some suggestion feel free to e-mail me but please don&#39;t send mails like

    "I want to hack the US government please help me" or "Tell me how to bind a trojan into a .jpg"

    Be sure if I can help you with something I will do it.

    <--=--=--=--=--=--=--=--=>



    Table of Contents



    1.What is this text about?

    2.About Encryption and how it works

    3.About the Cryptography and PGP

    4.Ways of breaking the encryption

    -Bad pass phrases

    -Not deleted files

    -Viruses and trojans

    -Fake Version of PGP

    =--=--=--=--=--=--=--=--=





    1.What is this text about?

    -=-=-=-=-=-=-=-=-=-=-=-=-=

    In this text I&#39;ll explain you everything about encryption,what is it,PGP,

    ways that someone can read your encrypted files etc.Every hacker or

    paranoid should use encryption and keep the other from reading their

    files.The encryption is very important thing and I&#39;ll explain you how can

    someone break and decrypt your files.



    2.About Encryption and how it works

    -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

    The Encryption is very old.Even Julius Caesar used it when he was

    sending messages because he didn&#39;t trust to his messengers.You see

    encryption is everywhere,when you watch some spy film you see

    there&#39;s always a computer with encrypted files or some film about hackers

    when the feds busted the hacker and they see all of the hacker&#39;s files are

    encrypted.



    When you have simple .txt file that you can read this is called "plain text".

    But when you use encryption and encrypt the file it will become unreadable

    by the time you don&#39;t enter the password.This text is called cipher text.

    The process of converting a cipher text into plain text is called decryption.



    Here&#39;s a little example:



    Plain text ==>Encryption==>Ciphertext==>Descryption==>Plaintext



    This example shows you the way when you encrypt and decrypt a file.



    3.About the Cryptography and PGP

    -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

    Cryptography is science that use the mathematics to encrypt and decrypt data.This science

    let you keep your files and documents safe even on insecure networks like the Internet.

    The cryptography can be weak and strong.The best is of course the strong one.Even when you

    use all the computers in the world and they&#39;re doing billion operations in second you&#39;ll just need

    BILLIONS of years to decrypt strong encryption.



    PGP (Pretty Good Privacy) is maybe the best encryption program to encrypt your files and documents.

    It work in this way:



    When you encrypt one file with PGP,PGP first compress the file.This saves you disk space and modem

    transmition.Then it creates a session key.This session key works with a very secure and fast

    confidential encryption algorithm to encrypt the file.Then the session key is encrypted with the

    recipient&#39;s public key.

    PGP ask you for pass phrase not for password.This is more secure against the dictionary attacks

    when someone tries to use all the words in a dictionary to get your password.When you use

    pass phrase you can enter a whole phrase with upper and lowercase letters with numeric and

    punctuation characters.





    4.Ways of breaking the encryption

    -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

    PGP has been written for people that want their files encrypted for people that want privacy.

    When you send an e-mail it can be read from other people if you use PGP only the person for who

    is the message will be able to read it.





    Now you know many things about PGP and the encryption but you may like to know can someone

    break it and read your private texts and files.In fact if you use all the computers in the world to

    decrypt a simple PGP message they&#39;ll need 12 million times the age of the universe to break it.

    You see this is the BEST the encryption is so strong noone can break it.

    The people that program it has done their work now everything depends on you.



    -Bad pass phrases

    *****************



    The algorithm is unbreakable but they&#39;re other ways to decrypt the text and read it.

    One of the biggest mistakes when someone writes his/her pass phrase is that the pass phrase is

    something like : "John" "I love you" and such lame phrases.Other one are the name of some friend

    or something like that.This is not good because this is pass phrase not password make it longer

    put numbers and other characters in it.The longer your pass phrase is the harder it will be guessed

    but put whole sentences even one that doesn&#39;t make sense just think in this way:

    Someone is brute-forcing thousands of pass phrases from a dictionary therefore my pass phrase

    should be someone that is not there in the dictionary something very stupid like:



    hEllowOrld33IjustwanTtoteLLtoev3ryon3thatI&#39;maLamErandI&#39;mahacKer666



    This is easy to remember because it&#39;s funny and there are only a few numbers but you may not use

    upper and lowercase characters.I hope you know will put some very good pass phrase and be sure

    noone will know it.



    Another mistake is that you may write the pass phase on a paper and if someone find it you&#39;ll loose

    it and he/she will be able to read your encrypted files.



    -Not deleted files

    ******************



    Another big security problem is how most of the operating systems delete files.So when you encrypt

    the file you delete the plain text and of course leave the encrypted one.

    But the system doesn&#39;t actually delete the file.It just mark those blocks of the disk deleted and free.

    Someone may run a disk recovery program and still see all the files but in plaintext.Even when you&#39;re

    writing your text file with a word editor it can create some temporary copies of it.When you close it

    these files are deleted but as I told you they&#39;re still somewhere on your computer.

    PGP has tool called PGP Secure Wipe that complete removes all deleted files from your computer

    by overwriting them.In this way you&#39;ll only have the encrypted files on your computer.



    -Viruses and Trojans

    ********************



    Another dangerous security problem are the viruses and the trojans.So when you infect with a

    trojan the attacker may run a key logger on your system.



    *Note

    A key logger is a program that captures all keystrokes pressed by you then saves them on your

    hard drive or send them to the attacker

    ***************************************

    So after the attacker run it he/she will be able to see everything you have written on your computer

    and of course with your PGP pass phrase.

    There are also a viruses designed to do this.Simpy record your pass phrase and send it back to the

    attacker.



    -Fake Version of PGP

    ********************



    Another security problem is the PGP source that is

    available so someone can make a fake copy of it that is recording your pass phase and

    sending it back to the attacker.The program will look real and it will work but it may also have

    functions you even don&#39;t know about.

    A way of defending of these security problems is to use a trojan and a virus scanner.You should

    also be sure your computer is clean from viruses and trojans when you install PGP and also be sure

    you get PGP from Network Associates Inc. not from some other pages.



    So now I hope you understand that PGP can&#39;t be braked but if you use it wisely and be sure

    your pass phrase is good one,you&#39;re not infected with viruses or trojans and you&#39;re using the

    real version of PGP you&#39;ll be secure.







    tHe mAnIaC is a member of Black Sun Research Facility (BSRF).

    Get more BSRF tutorials at http://blacksun.box.sk.
    ~: ทำทุกอย่างเพื่อ padawan :~

  2. #2
    Junior Member
    Join Date
    Oct 2008
    Posts
    21



    Manaul For WHO-INTERESTED-IN.

    Lamguage Vers.:TH

    **Hidden Content: To see this hidden content your post count must be 4 or greater.**


    30-Day Trial Vers. of PGP.

    **Hidden Content: To see this hidden content your post count must be 4 or greater.**


    More About : Pretty Good Privacy (PGP) (wiki)

    **Hidden Content: To see this hidden content your post count must be 4 or greater.**
    <div align="center">[img]http://pic.citec.us/out.php/i9115_Phantom.jpg[/img]</div>
    <div align="center">UbIqUiToUs</div>

Similar Threads

  1. The Basics of Your Home Alarm System
    By newsbot in forum World Hacking/Security News
    Replies: 0
    Last Post: 25-09-2009, 03:53 PM
  2. PHP and MySQL Basics
    By SheLLniX in forum PHP,ASP,Javascript, Html
    Replies: 0
    Last Post: 21-11-2008, 10:42 AM
  3. Trojan Basics
    By SheLLniX in forum Hacking Video
    Replies: 0
    Last Post: 20-10-2008, 09:34 AM
  4. WebHacking[Basics]
    By snapter in forum Hacking, Exploit Articles/Tutorial/Techniques
    Replies: 0
    Last Post: 13-10-2007, 10:45 PM
  5. Computer Security Basics
    By p_prasart in forum Hacking/Cracking's E-book
    Replies: 1
    Last Post: 23-02-2007, 10:40 PM

Members who have read this thread : 0

Actions : (View-Readers)

There are no names to display.

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •