wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cryptanalysis tool

profile
Sarvesh Vishwakarma
Nov 07, 2017
0 Likes
0 Discussions
1307 Reads

The information provided by website should be used for educational purpose only, website will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

Advanced Encryption Package Pro

Open Advanced Encryption Package Pro or  http://www.aeppro.com/download/latest.shtml Select File and put password as well as Riddle Here we can see the progress Click on ‘Encrypt Now’ Button to Encrypt the Text file. Encrypted text file will be stored on different location and Double Click to open the File. Use same password for Decrypt the encrypted text file. Or directly decrypt the file from the tree by selecting the encrypted file in the tree. using same password and click on 'Decrypt now'

BCTextEncoderPro

Open BCTextEncoderPro or http://bctextencoder.findmysoft.com/ Open a simple text file and click on encode Enter Password Now the file is Encrypted in AES-256 and save it. Re-open the Encoded to decrypt the data. Cryptool Open Cryptool or https://www.cryptool.org/en/ct2-downloads and open a simple Text file to Encrypt Select Encrypt/Decrypt and Select Ceasar. Enter Alphabet for character mapping and click on encrypt. Result of shift 2 ceaser cipher This time Click on Decrypt by keeping same value. original information Click on Hash value and select a text file select hash function. click close. Hashcalc Open Hashcalc or http://www.slavasoft.com/hashcalc/. Data Format should be File and select simple text file. chack HMAC and input a string. This time don’t check HMAC and calculate hash without key. this time use text string as data format

TrueCrypt

open truecrupt or https://truecrypt.en.softonic.com/?ex=DSK-309.3 click on create volume Select create an encrypted file container and click next. Select standard Truecrypt volume and click next. create a folder and browse the same folder . save with any name and click next. select encryption option. click on Auto-Test All. put the volume size as 10mb. set the password as 'truecrypt' Decide the volume format and click on Format. Click next and exit the wizard. check the property of the file created in folder. Select drive and hit Mount button. use same password and click OK . the 10mb's drive is given to drive O. to delete the encrypted volume , dismount the drive and delete the folder.

RohosDiskEncryption

open rohosdiskencryption or https://www.rohos.com/products/rohos-disk-encryption/ click Encrypt USB drive enter password and click create disk. now we can see the disk is connected. now goto disk and open rohosmini.exe . enter the same password used during disk creation. now we can see the encypted volume        

Comments ()


Sign in

Read Next

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

Sagar Parikrama

Blog banner

AIS & ANN based Malware detection for Android OS - Nupur Bhatt

Blog banner

Yoga in INDIA and ABROAD

Blog banner

How China Regained It's World's Largest Growing Economy Status

Blog banner

BUFFER OVERFLOW_142

Blog banner

A True Friendship

Blog banner

Memory Management in an Operating System

Blog banner

ADIDAS

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

Importance Of Yoga.

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

Hacking of web server and application

Blog banner

Know your Processors!

Blog banner

Device driver

Blog banner

Paralysis/Paralysis Stroke

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

SECURITY TOOLS

Blog banner

OPERATING SYSTEM

Blog banner

Respondo Launches Revolutionary Video Discussion App

Blog banner

Cache memory

Blog banner

Title: Modern Operating Systems: Powering the Digital Era

Blog banner

How To Invest In Indian Stock Market @ BSE & NSE ~ Tutorial 3

Blog banner

What is Anxiety? How to manage Anxiety?

Blog banner

Artificial Intelligence and I

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

Benefits of yoga and meditation

Blog banner

Trends that began during the pandemic

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

Short note on expert system

Blog banner

Memory input output management

Blog banner

Explain Kernel in OS

Blog banner

Operating system

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

The War With Cold On Earth

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

Malicious softwares

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

INTERNET

Blog banner

8 Reasons Why You Must Try Digital Marketing

Blog banner

Buffers in Operating Systems

Blog banner

Service Catalogue Management

Blog banner