Wednesday, October 9, 2013

ENCRYPTION ALGORHTYMS DECRYPTION ENCRYPTION TECHNIQUES METHODS, STANDARDS GORVAM SADDAR



Encryption standards[edit]
·         Data Encryption Standard (DES, now obsolete)
·         Triple-DES
·         Advanced Encryption Standard (AES)
·         RSA the original public key algorithm
·         OpenPGP
·         CipherSaber
Hash standards[edit]
·         MD5 128-bit (obsolescent)
·         SHA-1 160-bit
·         SHA-2 available in 224, 256, 384 and 512-bit variants
·         HMAC keyed hash
·         PBKDF2 Key derivation function (RFC 2898)
Digital signature standards[edit]
·         Digital Signature Standard (DSS), based on the Digital Signature Algorithm (DSA)
·         RSA
Public-key infrastructure (PKI) standards[edit]
·         X.509 Public Key Certificates
Wireless Standards[edit]
·         Wired Equivalent Privacy (WEP), severely flawed and superseded by WPA
·         Wi-Fi Protected Access (WPA) better than WEP, a 'pre-standard' partial version of 802.11i
·         802.11i a.k.a. WPA2, uses AES and other improvements on WEP
·         A5/1 and A5/2 cell phone encryption for GSM

List Of Hack toolshacking cyber security redhat linux/unix/backtrack/kali network security tools gorvam saddar



Wireshark (known as Ethereal until a trademark dispute in summer 2006) is a fantastic open source multi-platform network protocol analyzer. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need.

Metasploit

Metasploit took the security world by storm when it was released in 2004. It is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research.

Nessus 

Nessus is one of the most popular and capable vulnerability scanners, particularly for UNIX systems. It was initially free and open source...