Android Tips and Tricks for Getting the Most from Your Phone
Gone are the days when phones were only used to make phone calls and send text messages; nowadays, smartphones are more akin to a pocket-sized
You are mistaken if you believe Encryption, Hashing, Encoding, and Obfuscation are similar terms! Despite their apparent similarity, they are all opposed. This article discusses the structure and difference between hashing, encryption, encoding, and obfuscation. But first, let’s discuss some security terms.
Confidentiality refers to preventing unauthorized entities from accessing data and ensuring that actual users have exposure to restricted information.
Integrity refers to the ability to prevent data tampering.
Authentication is concerned with determining who owns the data.
Let’s start defining!
Encryption is the method of converting information that ensures confidentiality. Data encryption carries out using cryptographic keys. Before transmitting, the data is encrypted, and the recipient decrypts it. As a result, when information transfers, it is secure.
Encryption is of two types: symmetric and asymmetric.
The Public Key is almost everywhere. And if you aren’t aware of it, you even have it. Every time you access an HTTPS-enabled site, one key is in your web browser. AES, Blowfish, RSA are some algorithms uses for data encryption.
Alice tries to send a text to Bob, even though Julia is looking in and retrieving their conversations. So, how are Alice and Bob going to interact without Julia listening to them? Alice and Bob plan to encrypt their data using secret keys. Alice and Bob have two pairs of keys: one public key that anyone can use and one private key that they should always hide.
Only a private key can decrypt data encrypted with a public key and vice versa. Alice encrypts her message with Bob’s public key, and only Bob’s private key can decipher it. Bob gets and opens it with the private key, but how can Bob be confident that Alice sent it. Then, Alice would encrypt the message with Bob’s public key and her private key. To read the message and check that it is truly from Alice, Bob should first utilize Alice’s public key, next to his private key. On the other hand, Julia is unable to read the message as she doesn’t have access to anyone’s hidden keys.
Let’s say it was someone’s celebration, and you want to wish them. Your friend tries to make a joke by intercepting and changing your greeting to something awful. Assume the repercussions.
Hashing ensures the integrity of information. It safeguards information from tampering and ensures that it doesn’t alter in any way. A hash is a fixed-length number generated using a hash function.
Uniqueness is one of Hashing’s most crucial attributes. The hash function works in a manner that no two hashes for two distinct messages are identical. And it’s nearly rare to get back to the actual message from the hash value.
Hashing is combined with authentication to provide clear proof that a text does not tamper. This achieves through hash the input and verifies it with the sender’s private key. When the receiver receives the text, they will verify the signature of the hash using the sender’s public key, then hash the text itself and match it to the sender’s hash. If they match, it confirms the authentication of the authentic user. sha-3, md5 are some algorithms uses for hashing.
Use any MD5 hash generator and try converting the same sentence with minor changes.
Text: Hello World
Hash: b10a8db164e0754105b7a99be72e3fe5
Now Change the text a bit.
Text: Hello Worlds
Hash: 9f0d0cd67d27414d0ae8f5eca41a1a36
Notice how adding the ‘s’ in Worlds completely changed the hash value? And that is what hashing accomplishes.
The method of translating information from one type to another is known as encoding. It has nothing to do with the CIA triad. Since there is no mystery involved, and it is reversible. Encoding techniques are open to the public that uses to handle information. The information decodes using the same algorithm that uses to encrypt it. Ascii, unicode, URL Encoding, base64 are some algorithms uses for encoding.
Information transmitted over a network follows a particular layout, and URL-encoding the information enables it to do so.
Obfuscation, like encoding, does not offer any security properties even though it is often incorrectly seen as an encryption tool. Obfuscation is the process of converting a human-readable text into a text that is hard to comprehend.
Obfuscation of source code is a trendy use since it makes reverse engineering of a product more difficult. It can also be reversed, much like encoding, utilizing the similar strategy that obscured it.
Examples: javascript obfuscator, proguard.
Industrial Cybersecurity
September 28, 2023
Want always be up to date?
By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.
Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings
Gone are the days when phones were only used to make phone calls and send text messages; nowadays, smartphones are more akin to a pocket-sized
Can random characters in your code get you in trouble? They certainly can! Today, we are going to discuss CRLF injections and improper neutralization of
There is software available, like Metasploit, to gain remote access to any android phone. But other than that, we have the L3MON tool (A Cloud-based
Want always be up to date?
By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.
Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings