Hacking For Babies
  • Introduction
  • Ethical Hacking
  • Kali Linux
    • Why Kali ?
    • Virtual Machine
    • kali on Cloud
    • Bootable USB
    • Dual Boot Kali
    • Kali Nethunter
    • Most Used Linux Commands
    • Additional Information
  • Network Basics
    • What is the internet ?
    • Key Words
    • Network devices
    • LAN / WAN
    • VPN (Virtual Private Network)
    • Deep and Dark Web
    • Networking Commands
    • Additional Information
  • OSINT
    • Maltego
    • Google Advanced Search Operators
    • OSINT Username Finder
    • Social Media OSINT
    • Reverse Image Search
    • Protect yourself from OSINT
    • Additional Information
  • Digital Forensics
  • Phishing Attacks
    • Temporary Numbers
    • GitHub Projects/Tools
    • Kali Pre-Installed Tools
    • Emails Tricks
    • How to secure yourself from phishing attacks
    • Additional Information
  • Hardware Attacks
    • Marketplaces and Websites
    • Keylogger
    • USB Killer
    • Ethernet Hacking Tools
    • Flipper Zero
    • Bad USB
  • HID Attacks
    • Classic Bad USB
    • Wireless Bad USB
    • Keystroke Injection Cable
    • Other Tools Using the Some Concept
    • Simple Ducky Script
    • Reverse Shell Ducky Script
    • Solution for Bad USB
  • Cryptography
    • What is Cryptography ?
    • Simple Cryptography Algorithms
    • Hash Algorithms
    • Symmetric / Asymmetric cryptography
    • RSA Cryptosystem
    • Quantum Computers VS Cryptography
    • Steganography: Hiding Data in music and photos
    • Additional Information
  • Password Attacks
    • Dictionary Attacks
    • Brute Force Attacks
    • Hashcat
    • Hydra
    • Other Password Attacks Tools
    • Protect your Self against Password Attacks
  • Wireless Attacks
    • RFID / NFC Attacks
    • Bluetooth Attacks
    • MouseJack Attacks
    • IR Replay Attacks
    • RF Attacks
    • Wifi Attacks
  • WIFI Attacks
    • Wireless Adapters
    • Basic WIFI Manipulation
    • Deauthentication Attack
    • WIFI Cracking
    • MITM Attacks
    • Prebuild WIFI Pentesting Tools
    • WIFI Attack Solution
    • Additional Information
  • WIFI Cracking
    • WEP Cracking
    • WPS Attack
    • WPA Handshake Capture
    • PMKID Hash Capture
    • Hashcat Cracking
    • Wifite
    • Airgeddon
    • Fern WIFI Cracker
    • Protecting your Wi-Fi network from cracking
  • Coming Soon
Powered by GitBook
On this page
  • End-to-end encryption (E2EE)
  • Ransomware Using Cryptography.Fernet Library
  • Other Cryptography Course
  1. Cryptography

Additional Information

End-to-end encryption (E2EE)

End-to-end encryption (E2EE) is a type of encryption that ensures that only the sender and recipient of a message can read it. No one else, including the service provider or any third parties, can read the message, even if they have access to the communication.

E2EE is implemented by using two different keys to encrypt and decrypt the message: a public key and a private key. The public key is known to both the sender and the recipient, while the private key is kept secret by the recipient.

To encrypt a message, the sender uses the recipient's public key to encrypt the message. The encrypted message can then be sent to the recipient over any communication channel. To decrypt the message, the recipient uses their private key to decrypt the message.

E2EE is a very secure way to communicate, and it is widely used in a variety of applications, such as messaging apps, email services, and file transfer services.

Here are some examples of how E2EE can be used:

  • Messaging apps: E2EE is used in many messaging apps, such as WhatsApp, Signal, and Telegram. This ensures that your messages can only be read by the person you are communicating with.

  • Email services: E2EE is also used in some email services, such as ProtonMail and Tutanota. This ensures that your emails can only be read by you and the person you are communicating with.

  • File transfer services: E2EE can also be used to transfer files securely. For example, the file transfer service Sync.com uses E2EE to protect your files.

E2EE is a very important tool for protecting your privacy and security when communicating online. It is important to choose a service that supports E2EE if you need to communicate sensitive information.

Here are some of the benefits of using E2EE:

  • Privacy: E2EE ensures that your messages and files can only be read by you and the person you are communicating with. No one else, including the service provider or any third parties, can read your messages or files.

  • Security: E2EE protects your messages and files from being intercepted or accessed by unauthorized individuals.

  • Peace of mind: Knowing that your communications are protected by E2EE can give you peace of mind.

If you are concerned about your privacy and security when communicating online, you should use a service that supports E2EE.

Ransomware Using Cryptography.Fernet Library

  • Cryptography.Fernet Library

Fernet guarantees that a message encrypted using it cannot be manipulated or read without the key. Fernet is an implementation of symmetric (also known as “secret key”) authenticated cryptography. Fernet also has support for implementing key rotation via MultiFernet

more documentation about fernet:

  • The Coding Process

Other Cryptography Course

PreviousSteganography: Hiding Data in music and photosNextPassword Attacks

Last updated 1 year ago

You can watch how a Python ransomware is made using Cryptography.Fernet Library by watching created by .

This YouTube Video/Tutorial
NetworkChuck
Fernet (symmetric encryption) — Cryptography 42.0.0.dev1 documentation
Logo
Cryptography with Python - Quick Guide
Logo
Transforming a Plain Text message to Cipher Text - GeeksforGeeksGeeksforGeeks
SHA-1 Hash - GeeksforGeeksGeeksforGeeks
Transform EncryptionIronCore Labs
Cryptography — The Hitchhiker's Guide to Python
Logo
Logo
Logo
Logo