WHAT IS CRYPTOGRAPHY?
The Cryptography is derived from the Greek words "Kryptos". This is the study of secure communication techniques that allow only the sender and recipient of a message to view it's contents of transforming information into nonhuman readable form or vice versa is called cryptography.
As we know that information plays a vital role in running of any business and organizations etc, sensitive details in the wrong hands can leads to loss of business.
Cryptography is the science of ciphering and deciphering messages.To secure communication organizations use cryptology to cipher information .
Or
Cryptography is a method of protecting information and communication through the use of codes so that only those whom the information is intended can read and process it.
In Computer Science, Cryptography refers to secure information and communication techniques derived from mathematical concepts , a set of rule based calculations called algorithm to transform message in ways the hard to readable for human.
This is one of the secure way of communications for a hacker with the help of virtual private network(VPN) like Tor Browser which is also very helpful to change the IP Address(Location of the sender ) for illegal purpose to perform crime in cyberspace . I will discuss in brief about the VPN .
How to Encrypt and Decrypt the text in Cryptography?
Open this website with the help of internert surfing for encryption-"http://wwwmd5online.org"
Open the link for Decrypt the code text-"http://www.md5online.org/md5-decrypt.html"
Type whatever you want for encryption and it will crypt in the code form, copy that code and forward to the intended person whom you want for secure communication and then he/she will Decrypt in the real form.
Related links
- Hacking Tools Software
- Blackhat Hacker Tools
- Best Pentesting Tools 2018
- Hacker Tools List
- Hack Rom Tools
- Hacking Tools For Windows 7
- Hacking Tools Mac
- Tools For Hacker
- Hacking Tools Usb
- Hacking Tools Windows 10
- Hacking Tools For Pc
- Hacking Tools For Windows Free Download
- Hacking Tools Github
- Hacker Tool Kit
- Pentest Tools Framework
- Hacker Tools
- Kik Hack Tools
- Pentest Box Tools Download
- Hacking Tools
- Pentest Tools Bluekeep
- Hack Tools Download
- Hacker Hardware Tools
- Pentest Box Tools Download
- Hack Tools Download
- Hacking Tools And Software
- Hacker Tools Free
- Nsa Hack Tools Download
- Game Hacking
- Hacker Tool Kit
- Pentest Tools Windows
- Hacking Tools Software
- Hacker Techniques Tools And Incident Handling
- Beginner Hacker Tools
- Top Pentest Tools
- Hack Tools
- Hack Tools For Mac
- Hack Tool Apk
- Hackers Toolbox
- Hacker Tools For Mac
- Hackers Toolbox
- Hacking Tools For Kali Linux
- Pentest Tools Apk
- Pentest Tools Download
- New Hacker Tools
- Hacking Tools For Pc
- Hacking Tools For Mac
- Hacking Tools Usb
- Hacking Tools Windows 10
- Pentest Tools For Ubuntu
- Hacking Tools Mac
- Tools For Hacker
- Pentest Tools For Ubuntu
- Tools 4 Hack
- Hacking Tools Hardware
- Hacking Tools Usb
- What Are Hacking Tools
- Hacking Tools Github
- Hacker Tools List
- Hack And Tools
- Pentest Tools Review
- Pentest Reporting Tools
- Pentest Tools Online
- Pentest Box Tools Download
- Pentest Tools Windows
- Hacker Tools Hardware
- Hack Tools Online
- Hack Tools For Ubuntu
- Pentest Tools Open Source
- Pentest Tools Framework
- Pentest Tools Port Scanner
- Pentest Tools Download
- Hacking App
- Pentest Tools Kali Linux
- Hack Tools Pc
- Wifi Hacker Tools For Windows
- Pentest Tools Bluekeep
- Hacker Tools For Ios
- Pentest Tools Website
- Hack Apps
- Hacking Tools Online
- Hacker Tools For Mac
- Pentest Tools Free
- Hacking Tools For Beginners
- Hacker Tools Linux
- Pentest Tools Tcp Port Scanner
- Hacker Tools Apk
- Hacking Tools For Windows 7
- Pentest Recon Tools
- Hack Tools
- Hack Tools Github
- Hacking Tools Online
- Hacker Tool Kit
- Nsa Hacker Tools
- Physical Pentest Tools
- Hacker Tools
- Hacking Tools Pc
- Hacking Tools And Software
- Hacker Tools Software
USE OF CRYPTOGRAPHY IN HACKING