Kerberos is secure since it never transmits passwords over the network in clear. It is unique in its use of tickets, time-limited cryptographic messages that proves a user's identity to a given server without sending passwords over the network.
Wednesday, June 29, 2011
Tuesday, June 7, 2011
Digital Signatures
A digital signature is used to authenticate the identity of the sender to the receiver to a limited extent in order to verify the integrity of the message. It is necessary to the sender's public key by the prior knowledge or by trusted third party. A digital signatures is created by using the sender's private key to hash the entire message. The recipient uses the sender's public key to verify the integrity of the message. To sign the message, sender append their signature to the end of the message and encrypt using the recipient's public key.
Saturday, June 4, 2011
What is Steganography?
Basically, Steganography means of transmitting the message by hiding in any file like pictures, music, movies, or any file without changing the original file format. It happens somewhat like this.
You hide the message or the private file that you wanna send to your friend X. But it is very private, you are afraid that someone can have during the sending the file. What would you do now? It seems to be a great problem. Here is the solution you hide the file in any of the another file. Insert the file in the file. Now enter the password to encrypt the private file in the host file. The file is encrypted now. If you do open the encrypted file then the result you see is only the host file.
Friday, June 3, 2011
You need to hack!
Do you think "Why is it important?" The answer is yes it is very important because to catch a thief you must think like thief. To protect your system from all the attacks, it is most necessary that you must know about the attacks, hacks. It will be fruitful if you go positive towards it and you will ruin yourself if you get it negatively.
Due to the increasing number of hackers, the data are loosing their privacy, the system are no longer safer. So when know the hacker tricks, you can find out how
Wednesday, June 1, 2011
Algorithms and strengths
Cryptographic Algorithm
Symmetric key
- Data Encryption Standard ( DES )
- International Data Encryption Algorithm ( IDEA )
- Rjindael (AES Standard )
- Skipjack (used in ciphership )
Public key
- RSA public key
- Digital Signature Algorithms
- Gamal
- Kanpsack
Secure hash
- MD5
- SHA-1
- SHA-256
Subscribe to:
Posts (Atom)