Encryption- Crypto 101 WriteUp — TryHackMe (2024)

Table of Contents
Encryption- Crypto 101 WriteUp — TryHackMe #1 I’m ready to learn about encryption #1 I agree not to complain too much about how theory heavy this room is. #2 Are SSH keys protected with a passphrase or a password? #1 What does SSH stand for? #2 How do web servers prove their identity? #3 What is the main set of standards you need to comply with if you store or process payment card details? #1 What’s 30 % 5? #2 What’s 25 % 7 #3 What’s 118613842 % 9091 #1 Should you trust DES? Yea/Nay #2 What was the result of the attempt to make DES more secure so that it could be used for longer? #3 Is it ok to share your public key? Yea/Nay #1 p= 4391, q= 6659. What is n? #2 I understand enough about RSA to move on, and I know where to look to learn more if I want to. #1 I understand how keys can be established using Public Key (asymmetric) cryptography. #1 What company is TryHackMe’s certificate issued to? #1 I recommend giving this a go yourself. Deploy a VM, like Learn Linux and try to add an SSH key and log in with the private key. #2 Download the SSH Private Key attached to this room. #3 What algorithm does the key use? #4 Crack the password with John The Ripper and rockyou, what’s the passphrase for the key? #1 I understand how Diffie Hellman Key Exchange works at a basic level #1 Time to try some GPG. Download the archive attached and extract it somewhere sensible. #2 You have the private key, and a file encrypted with the public key. Decrypt the file. What’s the secret word? #1 I understand that quantum computers affect the future of encryption. I know where to look if I want to learn more.

Encryption- Crypto 101 WriteUp — TryHackMe

Encryption- Crypto 101 WriteUp — TryHackMe (1)

I tried to prepare a write-up for the “Encryption — Crypto 101” room on tryhackme.

  • Why cryptography matters for security and CTFs
  • The two main classes of cryptography and their uses
  • RSA, and some of the uses of RSA
  • 2 methods of Key Exchange
  • Notes about the future of encryption with the rise of Quantum Computing

#1 I’m ready to learn about encryption

ANSWER: No answer needed

Many of these key terms are shared with https://tryhackme.com/room/hashingcrypto101

#1 I agree not to complain too much about how theory heavy this room is.

ANSWER: No answer needed

#2 Are SSH keys protected with a passphrase or a password?

Passphrase: Separate to the key, a passphrase is similar to a password and used to protect a key.

ANSWER: passphrase

Cryptography is used to protect confidentiality, ensure integrity, ensure authenticity. You use cryptography every day most likely, and you’re almost certainly reading this now over an encrypted connection.

#1 What does SSH stand for?

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.

ANSWER: Secure Shell

#2 How do web servers prove their identity?

When you connect to your bank, there’s a certificate that uses cryptography to prove that it is actually your bank rather than a hacker.

ANSWER: certificates

#3 What is the main set of standards you need to comply with if you store or process payment card details?

Whenever sensitive user data needs to be stored, it should be encrypted. Standards like PCI-DSS state that the data should be encrypted both at rest (in storage) AND while being transmitted. If you’re handling payment card details, you need to comply with these PCI regulations.

ANSWER: PCI-DSS

There’s a little bit of math(s) that comes up relatively often in cryptography. The Modulo operator. Pretty much every programming language implements this operator, or has it available through a library. When you need to work with large numbers, use a programming language. Python is good for this as integers are unlimited in size, and you can easily get an interpreter.

#1 What’s 30 % 5?

ANSWER: 0

#2 What’s 25 % 7

ANSWER: 4

#3 What’s 118613842 % 9091

just google it

Encryption- Crypto 101 WriteUp — TryHackMe (2)

ANSWER: 3565

#1 Should you trust DES? Yea/Nay

ANSWER: Nay

#2 What was the result of the attempt to make DES more secure so that it could be used for longer?

The algorithm is believed to be practically secure in the form of Triple DES, although there are theoretical attacks.

ANSWER: Triple DES

#3 Is it ok to share your public key? Yea/Nay

ANSWER: Yea

#1 p= 4391, q= 6659. What is n?

ı use on this website.

ANSWER: 29239669

#2 I understand enough about RSA to move on, and I know where to look to learn more if I want to.

ANSWER: No answer needed

#1 I understand how keys can be established using Public Key (asymmetric) cryptography.

ANSWER: No answer needed

Digital signatures are a way to prove the authenticity of files, to prove who created or modified them. Using asymmetric cryptography, you produce a signature with your private key and it can be verified using your public key. As only you should have access to your private key, this proves you signed the file. Digital signatures and physical signatures have the same value in the UK, legally.

#1 What company is TryHackMe’s certificate issued to?

Encryption- Crypto 101 WriteUp — TryHackMe (4)

ANSWER: CloudFlare

#1 I recommend giving this a go yourself. Deploy a VM, like Learn Linux and try to add an SSH key and log in with the private key.

ANSWER: No answer needed

#2 Download the SSH Private Key attached to this room.

ANSWER: No answer needed

#3 What algorithm does the key use?

Encryption- Crypto 101 WriteUp — TryHackMe (5)

ANSWER: RSA

#4 Crack the password with John The Ripper and rockyou, what’s the passphrase for the key?

ı use this commands:

/usr/share/john/ssh2john.py [downloaded file location] > [new file name]

john [new file name] --worldlist=[rockyou.txt file location]

ANSWER: delicious

Key exchange allows 2 people/parties to establish a set of common cryptographic keys without an observer being able to get these keys. Generally, to establish common symmetric keys.

#1 I understand how Diffie Hellman Key Exchange works at a basic level

ANSWER: No answer needed

#1 Time to try some GPG. Download the archive attached and extract it somewhere sensible.

ANSWER: No answer needed

#2 You have the private key, and a file encrypted with the public key. Decrypt the file. What’s the secret word?

ı use this commands:

unzip gpg.zip

sudo gpg --import tryhackme.key

sudo gpg message.gpg

ls

cat message

ANSWER: Pineapple

Quantum computers will soon be a problem for many types of encryption.

#1 I understand that quantum computers affect the future of encryption. I know where to look if I want to learn more.

ANSWER: No answer needed

So far, I have tried to explain the solutions of the questions as detailed as I can. I hope it helped you.

Encryption- Crypto 101 WriteUp — TryHackMe (2024)
Top Articles
Biggest Differences Between Sonic And Shadow The Hedgehog
Medical Fellowship vs. Residency: Salary, Stress, Goals & More
Garrison Blacksmith Bench
Week 2 Defense (DEF) Streamers, Starters & Rankings: 2024 Fantasy Tiers, Rankings
Plaza Nails Clifton
Phone Number For Walmart Automotive Department
Cad Calls Meriden Ct
Beds From Rent-A-Center
Ub Civil Engineering Flowsheet
Optimal Perks Rs3
Lowes 385
Ncaaf Reference
Qhc Learning
Animal Eye Clinic Huntersville Nc
2024 U-Haul ® Truck Rental Review
Justified Official Series Trailer
Craigslist Portland Oregon Motorcycles
Golden Abyss - Chapter 5 - Lunar_Angel
The best firm mattress 2024, approved by sleep experts
Walgreens Alma School And Dynamite
Iu Spring Break 2024
Ups Drop Off Newton Ks
Contracts for May 28, 2020
Governor Brown Signs Legislation Supporting California Legislative Women's Caucus Priorities
Boston Dynamics’ new humanoid moves like no robot you’ve ever seen
Naval Academy Baseball Roster
Craigslist Hunting Land For Lease In Ga
Hwy 57 Nursery Michie Tn
Kaliii - Area Codes Lyrics
Kristy Ann Spillane
Tas Restaurant Fall River Ma
Cal Poly 2027 College Confidential
Craigslist Pa Altoona
Express Employment Sign In
2132815089
VDJdb in 2019: database extension, new analysis infrastructure and a T-cell receptor motif compendium
Doublelist Paducah Ky
Pike County Buy Sale And Trade
✨ Flysheet for Alpha Wall Tent, Guy Ropes, D-Ring, Metal Runner & Stakes Included for Hunting, Family Camping & Outdoor Activities (12'x14', PE) — 🛍️ The Retail Market
9:00 A.m. Cdt
Interminable Rooms
Arch Aplin Iii Felony
Deezy Jamaican Food
Phone Store On 91St Brown Deer
Dying Light Mother's Day Roof
Headlining Hip Hopper Crossword Clue
Marcel Boom X
Cryptoquote Solver For Today
Tamilblasters.wu
Palmyra Authentic Mediterranean Cuisine مطعم أبو سمرة
Les BABAS EXOTIQUES façon Amaury Guichon
Latest Posts
Article information

Author: Dean Jakubowski Ret

Last Updated:

Views: 6018

Rating: 5 / 5 (70 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Dean Jakubowski Ret

Birthday: 1996-05-10

Address: Apt. 425 4346 Santiago Islands, Shariside, AK 38830-1874

Phone: +96313309894162

Job: Legacy Sales Designer

Hobby: Baseball, Wood carving, Candle making, Jigsaw puzzles, Lacemaking, Parkour, Drawing

Introduction: My name is Dean Jakubowski Ret, I am a enthusiastic, friendly, homely, handsome, zealous, brainy, elegant person who loves writing and wants to share my knowledge and understanding with you.