The Basics of Cryptography
Table of Contents
1.What is this text about?
2.About Encryption and how it works
3.About the Cryptography and PGP
4.Ways of breaking the encryption
-Bad pass phrases
-Not deleted files
-Viruses and trojans
-Fake Version of PGP
=--=--=--=--=--=--=--=--=
1.What is this text about?
-=-=-=-=-=-=-=-=-=-=-=-=-=
In this text I'll explain you everything about encryption,what is it,PGP,
ways that someone can read your encrypted files etc.Every hacker or
paranoid should use encryption and keep the other from reading their
files.The encryption is very important thing and I'll explain you how can
someone break and decrypt your files.
2.About Encryption and how it works
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
The Encryption is very old.Even Julius Caesar used it when he was
sending messages because he didn't trust to his messengers.You see
encryption is everywhere,when you watch some spy film you see
there's always a computer with encrypted files or some film about hackers
when the feds busted the hacker and they see all of the hacker's files are
encrypted.
When you have simple .txt file that you can read this is called "plain text".
But when you use encryption and encrypt the file it will become unreadable
by the time you don't enter the password.This text is called cipher text.
The process of converting a cipher text into plain text is called decryption.
Here's a little example:
Plain text ==>Encryption==>Ciphertext==>Descryption==>Plaintext
This example shows you the way when you encrypt and decrypt a file.
3.About the Cryptography and PGP
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Cryptography is science that use the mathematics to encrypt and decrypt data.This science
let you keep your files and documents safe even on insecure networks like the Internet.
The cryptography can be weak and strong.The best is of course the strong one.Even when you
use all the computers in the world and they're doing billion operations in second you'll just need
BILLIONS of years to decrypt strong encryption.
PGP (Pretty Good Privacy) is maybe the best encryption program to encrypt your files and documents.
It work in this way:
When you encrypt one file with PGP,PGP first compress the file.This saves you disk space and modem transmition.Then it creates a session key.This session key works with a very secure and fast confidential encryption algorithm to encrypt the file.Then the session key is encrypted with the recipient's public key.
PGP ask you for pass phrase not for password.This is more secure against the dictionary attacks
when someone tries to use all the words in a dictionary to get your password.When you use
pass phrase you can enter a whole phrase with upper and lowercase letters with numeric and
punctuation characters.
4.Ways of breaking the encryption
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
PGP has been written for people that want their files encrypted for people that want privacy.
When you send an e-mail it can be read from other people if you use PGP only the person for who is the message will be able to read it.
Now you know many things about PGP and the encryption but you may like to know can someone break it and read your private texts and files.In fact if you use all the computers in the world to decrypt a simple PGP message they'll need 12 million times the age of the universe to break it.
You see this is the BEST the encryption is so strong noone can break it.
The people that program it has done their work now everything depends on you.
-Bad pass phrases
*****************
The algorithm is unbreakable but they're other ways to decrypt the text and read it.
One of the biggest mistakes when someone writes his/her pass phrase is that the pass phrase is
something like : "John" "I love you" and such lame phrases.Other one are the name of some friend or something like that.This is not good because this is pass phrase not password make it longer put numbers and other characters in it.The longer your pass phrase is the harder it will be guessed but put whole sentences even one that doesn't make sense just think in this way:
Someone is brute-forcing thousands of pass phrases from a dictionary therefore my pass phrase
should be someone that is not there in the dictionary something very stupid like:
hEllowOrld33IjustwanTtoteLLtoev3ryon3thatI'maLamErandI'mahacKer666
This is easy to remember because it's funny and there are only a few numbers but you may not use upper and lowercase characters.I hope you know will put some very good pass phrase and be sure noone will know it.
Another mistake is that you may write the pass phase on a paper and if someone find it you'll loose it and he/she will be able to read your encrypted files.
No comments:
Post a Comment