wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cryptanalysis tool

profile
Sarvesh Vishwakarma
Nov 07, 2017
0 Likes
0 Discussions
1307 Reads

The information provided by website should be used for educational purpose only, website will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

Advanced Encryption Package Pro

Open Advanced Encryption Package Pro or  http://www.aeppro.com/download/latest.shtml Select File and put password as well as Riddle Here we can see the progress Click on ‘Encrypt Now’ Button to Encrypt the Text file. Encrypted text file will be stored on different location and Double Click to open the File. Use same password for Decrypt the encrypted text file. Or directly decrypt the file from the tree by selecting the encrypted file in the tree. using same password and click on 'Decrypt now'

BCTextEncoderPro

Open BCTextEncoderPro or http://bctextencoder.findmysoft.com/ Open a simple text file and click on encode Enter Password Now the file is Encrypted in AES-256 and save it. Re-open the Encoded to decrypt the data. Cryptool Open Cryptool or https://www.cryptool.org/en/ct2-downloads and open a simple Text file to Encrypt Select Encrypt/Decrypt and Select Ceasar. Enter Alphabet for character mapping and click on encrypt. Result of shift 2 ceaser cipher This time Click on Decrypt by keeping same value. original information Click on Hash value and select a text file select hash function. click close. Hashcalc Open Hashcalc or http://www.slavasoft.com/hashcalc/. Data Format should be File and select simple text file. chack HMAC and input a string. This time don’t check HMAC and calculate hash without key. this time use text string as data format

TrueCrypt

open truecrupt or https://truecrypt.en.softonic.com/?ex=DSK-309.3 click on create volume Select create an encrypted file container and click next. Select standard Truecrypt volume and click next. create a folder and browse the same folder . save with any name and click next. select encryption option. click on Auto-Test All. put the volume size as 10mb. set the password as 'truecrypt' Decide the volume format and click on Format. Click next and exit the wizard. check the property of the file created in folder. Select drive and hit Mount button. use same password and click OK . the 10mb's drive is given to drive O. to delete the encrypted volume , dismount the drive and delete the folder.

RohosDiskEncryption

open rohosdiskencryption or https://www.rohos.com/products/rohos-disk-encryption/ click Encrypt USB drive enter password and click create disk. now we can see the disk is connected. now goto disk and open rohosmini.exe . enter the same password used during disk creation. now we can see the encypted volume        

Comments ()


Sign in

Read Next

Wedding photographer

Blog banner

Shoulders

Blog banner

Interesting fact about kangaroo.

Blog banner

An Overview of Virtual Machines

Blog banner

internet email and it's applications

Blog banner

Android Flashlight Application

Blog banner

How Men and Women Process Pain Differently

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

The Peephole

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

Why Summer Break Is Important for Emotional and Cognitive Growth?

Blog banner

Virtual Memory

Blog banner

Cyber Forensic in the Banking sector

Blog banner

The Importance of Data Quality Management in Data Science

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

Man VS Nature

Blog banner

Security in Cloud Computing

Blog banner

To travel is to live

Blog banner

Processing Crime and Incident Scenes

Blog banner

Self defence

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

Constrains in service design

Blog banner

Web browser forensics:Tools,Evidence collection and analysis

Blog banner

Microsoft Word

Blog banner

Service Transition Process in ITSM

Blog banner

Why is it hard to design an Operating Systems ?

Blog banner

Child labour

Blog banner

Multiple processor scheduling

Blog banner

Race Condition

Blog banner

Deadlock

Blog banner

Safeguarding Your Data: The Importance of Wireless Encryption

Blog banner

Beatbox

Blog banner

Deadlock and Starvation

Blog banner

Evolution of Operating system

Blog banner

LIFEHACKER

Blog banner

Technological Advancement

Blog banner

ACHIEVEMENTS IN OPERATING SYSTEMS

Blog banner

E-learning

Blog banner

Article on team management software

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner