Information plays a vital role in the running of business, organizations, military operations, etc. Information in the wrong hands can lead to loss of business or catastrophic results. To secure communication, a business can use cryptology to cipher information. Cryptology involves transforming information into the Nonhuman readable format and vice versa.

In this Cryptography and Network Security tutorial, we will introduce you to the world of cryptology and how you can secure information from falling into the wrong hands.

## Topics covered in this tutorial

- What is cryptography?
- What is cryptanalysis?
- What is cryptology?
- Encryption Algorithms
- Hacking Activity: Hack Now!

## What is Cryptography?

Cryptography is the study and application of techniques that hide the real meaning of information by transforming it into nonhuman readable formats and vice versa.

Let’s illustrate this with the aid of an example. Suppose you want to send the message “I LOVE APPLES”, you can replace every letter in the phrase with the third successive letter in the alphabet. The encrypted message will be “K NQXG CRRNGU”. To decrypt our message, we will have to go back three letters in the alphabet using the letter that we want to decrypt. The image below shows how the transformation is done.

The process of transforming information into nonhuman readable form is called encryption.

The process of reversing encryption is called **decryption**.

Decryption is done using a **secret key** which is only known to the legitimate recipients of the information. The key is used to decrypt the hidden messages. This makes the communication secure because even if the attacker manages to get the information, it will not make sense to them.

The encrypted information is known as a **cipher**. Next in this Cryptography tutorial, we will learn what is cryptanalysis.

## What is Cryptanalysis?

**Cryptanalysis** is the art of trying to decrypt the encrypted messages without using the key that was used to encrypt the messages. Cryptanalysis uses mathematical analysis and algorithms to decipher the ciphers. It is used to breach security systems to gain access to encrypted content and messages even the cryptographic key is unknown.

The success of cryptanalysis attacks depends

- Amount of time available
- Computing power available
- Storage capacity available

The following is a list of the commonly used Cryptanalysis attacks;

**Brute force attack**– this type of attack uses algorithms that try to guess all the possible logical combinations of the plaintext which are then ciphered and compared against the original cipher.**Dictionary attack**– this type of attack uses a wordlist in order to find a match of either the plaintext or key. It is mostly used when trying to crack encrypted passwords.**Rainbow table attack**– this type of attack compares the cipher text against pre-computed hashes to find matches.

## What is cryptology?

Cryptology combines the techniques of cryptography and cryptanalysis.

## Encryption Algorithms

**MD5**– this is the acronym for Message-Digest 5. It is used to create 128-bit hash values. Theoretically, hashes cannot be reversed into the original plain text. MD5 is used to encrypt passwords as well as check data integrity. MD5 is not collision resistant. Collision resistance is the difficulties in finding two values that produce the same hash values.

**SHA**– this is the acronym for Secure Hash Algorithm. SHA algorithms are used to generate condensed representations of a message (message digest). It has various versions such as;

**SHA-0**: produces 120-bit hash values. It was withdrawn from use due to significant flaws and replaced by SHA-1.**SHA-1**: produces 160-bit hash values. It is similar to earlier versions of MD5. It has cryptographic weakness and is not recommended for use since the year 2010.**SHA-2**: it has two hash functions namely SHA-256 and SHA-512. SHA-256 uses 32-bit words while SHA-512 uses 64-bit words.**SHA-3**: this algorithm was formally known as Keccak.

**RC4**– Brute force RC4 algorithm is used to create stream ciphers. It is mostly used in protocols such as**Secure Socket Layer (SSL)**to encrypt internet communication and**Wired Equivalent Privacy (WEP)**to secure wireless networks.**BLOWFISH**– this algorithm is used to create keyed, symmetrically blocked ciphers. It can be used to encrypt passwords and other data.

Now in this Cryptography tutorials series, we will learn how to crack RC4 and create a cipher using CrypTool.

## Hacking Activity: How to create a Cipher using CrypTool

In this practical Cryptool tutorial, we will create a simple cipher using the RC4 brute force tool. We will then attempt to decrypt it using brute-force attack. For this exercise, let us assume that we know the encryption secret key is 24 bits. We will use this information to break the cipher.

### Creating the RC4 stream cipher

**Step 1) Download and intall CryptTool**

We will use CrypTool 1 as our cryptology tool. CrypTool 1 is an open source educational tool for crypto logical studies. You can download it from https://www.cryptool.org/en/ct1/

**Step 2) Open CryptTool and replace the text**

We will encrypt the following phrase

__Never underestimate the determination of a kid who is time-rich and cash-poor__

We will use 00 00 00 as the encryption key.

- Open CrypTool 1

- Replace the text with Never underestimate the determination of a kid who is time-rich and cash-poor

**Step 3) Encrypt the text**

- Click on Encrypt/Decrypt menu

- Point to Symmetric (modern) then select RC4 as shown above
- The following window will appear

**Step 4) Select encryption key**

- Select 24 bits as the encryption key
- Set the value to 00 00 00
- Click on Encrypt button
- You will get the following stream cipher

### Attacking the stream cipher

**Step 5) Start Analysis**

- Click on Analysis menu

- Point to Symmetric Encryption (modern) then select RC4 as shown above
- You will get the following window

- Remember the assumption made is the secret key is 24 bits. So make sure you select 24 bits as the key length.
- Click on the Start button. You will get the following window

- Note: the time taken to complete the Brute-Force Analysis attack depends on the processing capacity of the machine been used and the key length. The longer the key length, the longer it takes to complete the attack.

**Step 6) Analyse the results**

- When the analysis is complete, you will get the following results.

- Note: a lower Entropy number means it is the most likely correct result. It is possible a higher than the lowest found Entropy value could be the correct result.
- Select the line that makes the most sense then click on Accept selection button when done

## Summary

- Cryptography is the science of ciphering and deciphering messages.
- A cipher is a message that has been transformed into a nonhuman readable format.
- Deciphering is reversing a cipher into the original text.
- Cryptanalysis is the art of deciphering ciphers without the knowledge of the key used to cipher them.
- Cryptology combines the techniques of both cryptography and cryptanalyst.
- RC4 brute force online algorithm is used to create stream ciphers. It is mostly used in protocols such as Secure Socket Layer (SSL) to encrypt internet communication and Wired Equivalent Privacy (WEP) to secure wireless networks.

what is cryptography cryptanalysis rc4 and cryptool analysis |

what is cryptography cryptanalysis rc4 and cryptool app |

what is cryptography cryptanalysis rc4 and cryptool application |

what is cryptography cryptanalysis rc4 and cryptool book |

what is cryptography cryptanalysis rc4 and cryptool browser |

what is cryptography cryptanalysis rc4 and cryptool card |

what is cryptography cryptanalysis rc4 and cryptool code |

what is cryptography cryptanalysis rc4 and cryptool community |

what is cryptography cryptanalysis rc4 and cryptool computer |

what is cryptography cryptanalysis rc4 and cryptool converter |

what is cryptography cryptanalysis rc4 and cryptool download |

what is cryptography cryptanalysis rc4 and cryptool error |

what is cryptography cryptanalysis rc4 and cryptool example |

what is cryptography cryptanalysis rc4 and cryptool explain |

what is cryptography cryptanalysis rc4 and cryptool extension |

what is cryptography cryptanalysis rc4 and cryptool fast |

what is cryptography cryptanalysis rc4 and cryptool file |

what is cryptography cryptanalysis rc4 and cryptool flow |

what is cryptography cryptanalysis rc4 and cryptool for |

what is cryptography cryptanalysis rc4 and cryptool github |

what is cryptography cryptanalysis rc4 and cryptool hub |

what is cryptography cryptanalysis rc4 and cryptool id |

what is cryptography cryptanalysis rc4 and cryptool in |

what is cryptography cryptanalysis rc4 and cryptool info |

what is cryptography cryptanalysis rc4 and cryptool install |

what is cryptography cryptanalysis rc4 and cryptool ios |

what is cryptography cryptanalysis rc4 and cryptool key |

what is cryptography cryptanalysis rc4 and cryptool latest |

what is cryptography cryptanalysis rc4 and cryptool library |

what is cryptography cryptanalysis rc4 and cryptool life |

what is cryptography cryptanalysis rc4 and cryptool linux |

what is cryptography cryptanalysis rc4 and cryptool lite |

what is cryptography cryptanalysis rc4 and cryptool login |

what is cryptography cryptanalysis rc4 and cryptool mac |

what is cryptography cryptanalysis rc4 and cryptool mail |

what is cryptography cryptanalysis rc4 and cryptool manager |

what is cryptography cryptanalysis rc4 and cryptool media |

what is cryptography cryptanalysis rc4 and cryptool module |

what is cryptography cryptanalysis rc4 and cryptool net |

what is cryptography cryptanalysis rc4 and cryptool no |

what is cryptography cryptanalysis rc4 and cryptool on |

what is cryptography cryptanalysis rc4 and cryptool online |

what is cryptography cryptanalysis rc4 and cryptool option |

what is cryptography cryptanalysis rc4 and cryptool pdf |

what is cryptography cryptanalysis rc4 and cryptool platform |

what is cryptography cryptanalysis rc4 and cryptool quora |

what is cryptography cryptanalysis rc4 and cryptool service |

what is cryptography cryptanalysis rc4 and cryptool setup |

what is cryptography cryptanalysis rc4 and cryptool software |

what is cryptography cryptanalysis rc4 and cryptool solutions |

what is cryptography cryptanalysis rc4 and cryptool studio |

what is cryptography cryptanalysis rc4 and cryptool tech |

what is cryptography cryptanalysis rc4 and cryptool technology |

what is cryptography cryptanalysis rc4 and cryptool together |

what is cryptography cryptanalysis rc4 and cryptool tool |

what is cryptography cryptanalysis rc4 and cryptool tutorial |

what is cryptography cryptanalysis rc4 and cryptool video |

what is cryptography cryptanalysis rc4 and cryptool website |

what is cryptography cryptanalysis rc4 and cryptool wiki |

what is cryptography cryptanalysis rc4 and cryptool with |

what is cryptography cryptanalysis rc4 and cryptool works |

what is cryptography cryptanalysis rc4 and cryptool youtube |