Chapter 14 - 03 - Discuss Various Hash Functions and Cryptography Tools - 03_ocred_fax_ocred.pdf
Document Details
Uploaded by barrejamesteacher
null
CompTIA
Tags
Related
- Chapter 14 - 03 - Discuss Various Hash Functions and Cryptography Tools - 01_ocred.pdf
- Chapter 14 - 03 - Discuss Various Hash Functions and Cryptography Tools - 02_ocred.pdf
- Chapter 14 - 03 - Discuss Various Hash Functions and Cryptography Tools - 03_ocred.pdf
- Certified Cybersecurity Technician Cryptography PDF
- Chapter 14 - 03 - Discuss Various Hash Functions and Cryptography Tools - 02_ocred_fax_ocred.pdf
- Cryptography Engineering: Design Principles and Practical Applications PDF
Full Transcript
Certified Cybersecurity Technician Exam 212-82 Cryptography Hash Calculators fo...
Certified Cybersecurity Technician Exam 212-82 Cryptography Hash Calculators for Mobile IMiobile Hash Tools Hash Droid VLTS Hash Checker https://play.google.com ## hash hash tools tools Hash Droid WA waeame wename SO o File Fie path pat RSO i e i i e Hashr Hashr - Hash Hash & Checksum Calculator emulated/0/Download/open_gapps_log txt emulated/0/Download/open_gapps_log txt (MDS)5‘ e ‘MD e.. https://play.google.com MDS MD5 HASHOROID APK HASHOROID.APK [ Result in upper case e ey Hash Calc https://play.google.com 115e40550ad3etadbelct? etadbeict? CORY R CHECKIMTO LIPROAD aRece Hash Generator - Checksum Calculator https://play.google.com https://play.google.com https://play.google.com Hash Smart Checker https://play.google.com @ httpsy//play.google.com Copyright Pyrig by Y EC-{ { © by L. All Rights L Reserved. Reproduction P Strictly ¥ Prohibited. Is Strictly Hash Calculators for Mobile Some hash calculators for mobile devices are discussed below. = Hash Tools Source: https://play.google.com Hash Tools is a utility for calculating a hash from a given text or decrypting a hash to its original text. In this application, the available hash functions are MD5, SHA-1, SHA-256, SHA-384, and SHA-512. 1715 # hash tools (¢ B CHOOSE FILE File v pat emulated/0/Download/open_gapps_log.txt MDS v Figure 14.16: Screenshot of Hash Tools Module 14 Page 1682 Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Cryptography = Hash Droid Source: https://play.google.com The Hash Droid utility helps to calculate a hash from a given text or a file stored on the device. In this application, the available hash functions are Adler-32, CRC-32, Haval-128, MD2, MD4, MDS5, RIPEMD-128, RIPEMD-160, SHA-1, SHA-256, SHA-384, SHA-512, Tiger, and Whirlpool. ©o =..195%016:58 =..195%016:58 Hash Droid HASH A COMPARE TEXT HASHAFILE HASHES Select a hash function; function: MDS v HASHDROID.APK [T] Result in upper case CALCULATE Name: HashDroid.apk Size: 1,46 MiB MiB MDS5 checksum MDS 55dc3e8421935ed4e550ad3ebadbeBcf2 55dc3e8421935e4e550ad3ebadbe8cf2 COPY CHECKSUM TO CLIPBOARD Figure 14.17: Figure 14.17: Screenshot Screenshot ofof Hash Hash Droid Droid Some additional Some additional MD5 MDS5 hash hash calculators calculators are are as as follows: follows: = Hash Checker (https://play.google.com) = Hashr - Hash & Checksum Calculator (https://play.google.com) = Hash Calc (https://play.google.com) = Hash Generator - Checksum Calculator (https://play.google.com) = Hash Smart Checker (https://play.google.com) Module 14 Page 1683 Certified Cybersecurity Technician Copyright © by EG-Gouncil EG-Bouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Cryptography Cryptography Tools BCTextEncoder AxCrypt © 06 Q Encrypts confidential text in your message https://axcrypt.net https://axcrypt.net O Uses strong symmetric and public-key algorithms for data encryption ® T BCTestEncoder BCTestEncoder Utility v, 1.03.2.1 - [=] X Microsoft Cryptography Tools Microsoft Cryptography Tools file Edit Key QOptions Help Ele Edit Key Qptions Help https://docs.microsoft.com DG DEE AO0Tad 0T B& & ? Decoded Decoded plan text: plan 7948 text: 7940 Encodeby:by: || password Encode possword v Ecode | [[BCTextEncoder BCTextEncoder uthty utity softmare softnare smoifies envodng ervodng and decodng text data, data, Plain text data data are compressed, enarypted and converted to text format, which can then be easly copied to the dpboard or saved as a text fle. Concealer CDncealer Protect from hackers and makcous malcous software ee nvable to the Internet and untrusted netwerks nvable to the Internet and untrusted networks https://www.belightsoft.com Morvtor appheations Morvtor apphcations accessng accessng network network | Searity Seauity poloes to meet your neecsneeds 0O e Encoded text: 1.2/ Ercoded text: 1.2 00 Decode “BLGIN “BLGIN LNCOOLD MESSAGL MESSAGE - CryptoForge Version: 8CTextEncoder Uthityv,. 1.03.2.1 §CTextEncoder Utinty https://www.cryptoforge.com vy ECQMCSOTXsh wyECQMESO Jcodg 25 20 TH0Y X Icod) PEKY LGhufSGNME LGk FSGHM 25Qe 4A WEUF WEUF Lern LerFh Chie Zebizl 2ehizt 04B3ASNDE0GWL 0:09ASsnDE0BWDOE 05 BN EKLANDE0B ANDEOB 2241 376G I TGP SSN WAATF 3A yONNYER2 yOMNYENz +4 +822G2v +822G2v fflL22 QCOYEbIMOATIATIVREEVINCQORALD 7SR JGRPLICHEOM SY XX WK GCOYELIM0ASATHVREEVWCGORALD 7R JRPLIGheO™ LK 7H 44ot TN 0 4A an 22110QRIDEHHImHinhmuZiom 10QRIDES ImrinhmuZigm 2xbg 33 ITNQLAChAYTePFwQlvaBe ITNQLOCHYTePFwaGlvaBe UZMOTeck +81) UZMOTeck +0U ® A 3QSAMSIQ0L VU Sy KEXCyxOGDAMNX TOQuSVMI KRDYUDIK ADLEG F8MCIEF OCHOARKIPIATP 297X VOV ZVXWROCUE DD fx IvF SyVDCARDMOY LYTIIYD 4w 4tn Z5ATYPEFUnEO 44 ICEZPS SN BWPDVMOST e 4L 2 BV AOHSAQZIHIr gy y ACOPRXIINO X¥QEFKINEON0 ++ 5 DR XEINO QOFIIWeOt0 (S HbSIUIITmQ HybSOUIIT=Q == Cyphertop R © https://cyphertop.com +ere D ENCOOED MESSAGE - https.//www jetico.com https.//www jetico.com Copyright © byby ECEC- L. All Rights Rights Reserved, Reserved. ReproductionIs Strictly Prohibited Prohibited. Cryptography Tools You can use various cryptographic tools for encrypting and decrypting your information, files, etc. These tools implement different types of encryption algorithms. = BCTextEncoder Source: https://www.jetico.com The BCTextEncoder utility simplifies the encoding and decoding of text data. It compresses, encrypts, and converts plaintext data into text format, which the user can then copy to the clipboard or save as a text file. It uses public key encryption methods as well as password-based encryption. Furthermore, it uses strong and approved symmetric and public-key algorithms for data encryption. Module 14 Page 1684 Certified Cybersecurity Technician Copyright © by EG-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Cryptography zT BCTextEncoder BCTextEncoder Utility v.v. 1.03.2.1 Utility 1.03.2.1 -— [m] O XX File Eile Edit Key Options Help BEEO0Td® BEE BT & & &7? - Decoded plain text: Decoded plain text: 7948 7948 Encode by: password Encode by: ipasword v|V [TEncode E@ ] BCTextEncoder utility software simplifies simplifies encoding encoding and and decoding text data. Plain text data are compressed, encrypted and converted to text format, which can then be easily copied to the dipboard or saved as a text file. and malicious Protect from hackers and malicious software invisibleto the Internet Be invisible Internet and untrusted networks Monitor applications applications accessing accessing network network Security policies to meet meet your needs needs Encoded text: 1.2KB Encoded text: 1.2KB | Decode. Decode -----BEGIN ENCODED MESSAGE----- Version: BCTextEncoder Utility v. 1.03.2.1 wy4ECQMCSOZXsh3Ncodg2S 2R;j 76KYjuGkufSGNMK 2R 2s 4WEUFTirHFhChXe2eh9zL WEUFTirHFhChXe2eh9zL 0sB9ASsnDBOBwb0s9s8Ku4mD60B2HN37GP 0sB9ASsnDBOBwb0s9s8Ku4mD60B2HN 37GP 55Kd4ZF 3yOVNYEkz 3lyOVNYEkz ++azZG2v kfLz kfLz qCpygbf3M20Ami47iNwReeV\WCqORdLD qCpygbf3M20Ami47iNwReeVWCqORALD 75hR /cRPLSgkeoPiSPrX InWK7N +adM4A INWK7N +adM4iA 2110QfUOdfPk3fimHinhmuZjgm2xbg3 2110QfUOd 3fjmHinhmuZjgm2xbg3 Pk 1TNQLoChnYTePFwzQhwBe /UZMOTedk 1TTNQLoChnYTePFwzQhwBeJUZMOTedk +8U 7pd3Q5AHsIQoI4VUx 7pd3Q5AHSsIQoI4VUx SmivKsXCyxOGIDaMnx70QwSVMz/KRpyUpaK SmivKsXCyxOGIDaMnx70QwSVMz/KRpyUpaK +DL6G 7sMCI6F 7sMCI6F OChoAxKIPj43P 2grxfVOVZvXWqoCuESSfx 2grxfVOVZvXWqoCuE99fx 1vF SvvbCARpMga 1fYTkJYp +mhix-+.n 1fYTkIYp+mhix+Ln Z54YYFEFLkwMdO +k +YIC8ZPS 254YYFEFLkwMdO +YIC8ZPS SDn8WPDVMOjTccqz4GL2L/BuV 19HS5AQZtHOrgKyy 19H5AQZtHSrqKyy kCB9jeX8kZNO 3rQ8FKkWeOti0 3rQ8FKkWeOtii0 +fSdFr3ybSBUISTmQ= +fSdFr 3ybSBUISTmQ= =qUzR ----—-END -----END ENCODED MESSAGE----- MESSAGE ----- Figure 14.18: Screenshot of BCTextEncoder Some additional cryptography tools are as follows: = AxCrypt (https.//axcrypt.net) (https://axcrypt.net) * Microsoft Cryptography Tools (https://docs.microsoft.com) *= Concealer (https://www.belightsoft.com) (https.//www.belightsoft.com) = CryptoForge (https://www.cryptoforge.com) = Cyphertop (https.//cyphertop.com) (https://cyphertop.com) Module 14 Page 1685 Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited.