CryptoTutorials: Part 2

July 14, 2011

By Israel Torres, a hacker at large with interests in the hacking realm and an author of crypto challenge: http://hakin9.israeltorres.org


PART 2 Cryptography Fundamentals: You can’t hide what isn’t there

As previously discussed in part 1 of this series communication can exist between one or more entities without ever making their existence known even when such entities have intelligence that their communications are being monitored. This is seen at any two points where messages must fall into ‘public space’ during ransit from sender to recipient. One of the best examples the coded communication that occurs in prison systems. Where mixed in various methods are orders to get things done; contraband gotten; kill people.


What you will learn…
how to make important information nearly invisible to the naked eye

What you should know…
basic obfuscation techniques



Tagged with:

Leave a Comment

Please keep in mind that comments are moderated and rel="nofollow" is in use. So, please do not use a spammy keyword or a domain as your name, or it will be deleted. Let us have a personal and meaningful conversation instead.

You must be logged in to post a comment.

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa