Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 1

1.

**Definition**: Cryptography is the study and practice of techniques for secure


communication in the presence of adversaries.
2. **Purpose**: It ensures confidentiality, integrity, authenticity, and non-
repudiation of information.
3. **Key Concepts**:
- **Encryption**: Converting readable data (plaintext) into an unreadable
format (ciphertext) to protect its confidentiality.
- **Decryption**: Converting ciphertext back to its original plaintext form.
- **Key**: A piece of information used for encryption and decryption.
4. **Types of Cryptography**:
- **Symmetric Cryptography**: Uses the same key for both encryption and
decryption (e.g., AES).
- **Asymmetric Cryptography**: Uses a pair of keys: a public key for encryption
and a private key for decryption (e.g., RSA).
5. **Hash Functions**: Convert input data of any size into a fixed-size value
(hash). It's used for data integrity checks (e.g., SHA-256).
6. **Digital Signatures**: A cryptographic equivalent of a handwritten signature,
ensuring the authenticity and integrity of a message.
7. **Cryptographic Protocols**: Rules that dictate how cryptographic algorithms
should be used (e.g., SSL/TLS for secure web communication).

Authentication Bypass Guide by Acunetix:


https://www.acunetix.com/vulnerabilities/web/tag/authentication-bypass/

Cryptographic Failures Analysis by CrashTest Security:


https://crashtest-security.com/owasp-cryptographic-failures/#:~:text=and
%20prevention%20measures.-,What%20is%20a%20Cryptographic%20Failure%20Vulnerability
%3F,or%20non%2Dexistent%20cryptographic%20algorithm.

Exploring Reset Password Vulnerabilities on Medium:


https://medium.com/@cuncis/exploring-reset-password-vulnerabilities-risks-exploits-
and-prevention-strategies-87745b65dd66rategies-87745b65dd66

You might also like