Types of Encryption

Encryption is the process of securing the information by making such information can not be read without the help of specialized knowledge. The advantage of encryption is the original code we can not be read by others. This is also my experience writing in a race where about additional network security to the participants to do is to break the password has been changed in some form so that an understanding of the methods of encryption and hashing + salting know the concept is needed to crack passwords that exist. 





Hopefully the discussion on Hash and Salt techniques I will discuss in other articles (if I'm not lazy writing, most of the other sites are also dirty, hehe). Oh yes, I include this because deh too, so I can bwt iseng2. For those who are already expert sich like this can definitely crack g need a long time, but if it took me 15 minutes to cracking 4 of 6 form a dizzying encryption is: Problem: Here is a password database (6 passwords) are stored with the format particular: 1. ) Bc190851cb59f2c02a71ed6c1477e6ed 2.) 3f24a14cf2d89317eeb92ba9c66c4f29 3.) 0599f7d0a645d0f171903316a939db79 4.) Ac3db592ceaf8ccd037dc9e222eee7da0e97378c 5.) 17e15de2eb514933451ba5fde8a3bc13bbce0e09 6.) C84100e2c2eb56c683ec8d2d8943ddae6b5f61011. Find the password (6 password). 2. Describe the tools you use. 3. Explain how you get results faster. 4. Explain your reasons for using the methods and tools that you choose. If anyone could've ngecrack, disono there is a place where I kuliah.Gud Yach Luck! :-) ================================================== Here are some kinds of encryption methods can be used on websites such as PHP programming, ASP and others. 


1. Encryption methods MD2 Algortihm Message-Digest 2 (MD2) is a cryptographic hash function developed by Ronald Rivest in 1989. The algorithm is optimized for 8-bit computers. MD2 defined in RFC 1319. Although other algorithms have been proposed in the past, such as MD4, MD5 and SHA, even up to 2004 [update] MD2 still used in public key infrastructures as part of a certificate generated with MD2 and the RSA. 


2. Encryption methods MD4 Message-Digest algortihm 4 (4th series) designed by Professor Ronald Rivest of MIT in 1990. Its length is 128 bits. MD4 is also used to calculate summary NT-hash the password in Microsoft Windows NT, XP and Vista. 


3. MD5 Encryption Method MD5 is one of a series of message digest algorithms designed by Professor Ronald Rivest of MIT (Rivest, 1994). When analytic work suggests that the predecessor of the MD4 MD5 began insecure, MD5 was designed in 1991 and then instead of MD4 (MD4 weaknesses discovered by Hans Dobbertin). In cryptography, MD5 (Message-Digest algortihm 5) is a cryptographic hash function widely used with 128-bit hash value. In Internet standard (RFC 1321), MD5 has been utilized in a variety of security applications, and MD5 are also commonly used for testing the integrity of a file. 


4. SHA Encryption Method SHA is a series of cryptographic hash functions designed by the National Security Agency (NSA) and published by NIST as a U.S. Federal Information Processing Standard. SHA is the Secure Hash Algorithm. The types of SHA SHA-0, SHA-1, and SHA-2. For SHA-2 algorithms are identical to the summary measure of well-known variables as SHA-224, SHA-256, SHA-384, and SHA-512. 


5. RC4 Encryption Method RC4 is one type of stream ciphers, ie processing units or input data at one time. Unit or a byte of data in general or even sometimes bits (a byte in the case of RC4). In this way the encryption or decryption can be implemented in a variable length. RC4 is an encryption stream cipher created by Ron Riverst in 1987 for RSA Security. The algorithm is based on random permutations. 


6. Base64 Encryption Method Base64 is a system for representing raw data bytes as ASCII characters. Base64 provides 6-bit encoding 8-bit ASCII characters. Base64 is a format that uses printable characters, allowing binary data to be sent in the form and email, and will be stored in a database or file.