Page not found – ShopingServer Wiki http://wiki.shopingserver.com Tutorials and Articles About Technology and Gadgets Sat, 10 Oct 2020 06:23:56 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.14 http://wiki.shopingserver.com/wp-content/uploads/2018/07/cropped-favicon-150x150.png Page not found – ShopingServer Wiki http://wiki.shopingserver.com 32 32 How to hide files and folders in Windows 10 – Hidden files http://wiki.shopingserver.com/how-to-hide-files-and-folders-in-windows-10-hidden-files/ http://wiki.shopingserver.com/how-to-hide-files-and-folders-in-windows-10-hidden-files/#respond Sat, 10 Oct 2020 06:23:56 +0000 http://wiki.shopingserver.com/?p=28199 If you want to hide your files and folders in Windows 10, so that it is not even visible by checking the Hidden item, do not miss this tutorial in Facebook.

In many cases, you do not have a personal computer at home or even at work, and you have to share a system. In this case, you may need to hide some of your files. And In addition, if you have important private data and for any reason you want to make it more secure, you can use the method described below. Be with Ficit by learning this trick .

Hide file or folder in Windows 10

Hiding files and folders in Windows 10 is very simple. You only need one command line command to do this. For example, suppose you want to hide a file named sample.mp4 in the ToHide folder. To do this, just follow the steps below:

1. Run the CMD program (to do this, you can press the Windows + R keys simultaneously and enter the phrase cmd.exe and click on the CMD program).

2. Now enter the following command in CMD and enter. (Enter the items you want instead of the file name and folder name.)

attrib C: \ Users \ Lori \ Documents \ ToHide \ sample.mp4 + s + h

So far, the file you are looking for is hidden in Windows 10. S + means that it is a file system and is used by the operating system. These files are not normally displayed in the directory list. h + but refers to hidden files and specifies that files should not be listed in directories by default. It should also be noted that the letters in the CMD environment are not case sensitive, and you can type h and s in uppercase.

The important point is that when you enter the Explorer file, which contains hidden files and folders, none of these files will be displayed, even if you go to View> Show / hide and check the Hidden items option, open it. These files are also not displayed.

Hide file in Windows 10
Hide file in Windows 10 –

Re-hide hidden files

If you have hidden a file or folder, you can now unhide it with the same command, just use – instead of + in the command. In other words, to re-display the file we hid above, you must now use the following command:

attrib C: \ Users \ Lori \ Documents \ ToHide \ Sample.mp4 -s -h


If you have personal files and folders that you don’t want to be visible to all users of your PC or you want to hide them so that they do not get deleted accidentally then here is the step by step guide for you.

Hiding Files and Folders Using File Explorer

Once you are done with these steps, the file or folder will not be visible anymore. Windows 10 doesn’t show the hidden files and folders in Explorer or file menus by default. If you need Windows 10 to show your hidden files, open the file explorer, go to view and check the “Hidden items” box.

Show hidden files and folders in Windows file explorer


]]>
http://wiki.shopingserver.com/how-to-hide-files-and-folders-in-windows-10-hidden-files/feed/ 0
Introducing the top 3 software for measuring computer temperature http://wiki.shopingserver.com/introducing-the-top-3-software-for-measuring-computer-temperature/ http://wiki.shopingserver.com/introducing-the-top-3-software-for-measuring-computer-temperature/#respond Sat, 10 Oct 2020 06:14:06 +0000 http://wiki.shopingserver.com/?p=28195 Excessive heat can cause serious damage to computers and laptops, but how do we know the temperature of various system components? In this article, we will introduce 3 of the best software in this field.

Overheating of the computer and laptop can be an important sign of system malfunction, especially in the case of laptops. This may be due to excessive dust and lack of proper airflow.

Not paying attention to the heat of the laptop and the system is exactly the best way to destroy the system, but in addition, too much heat can disrupt the performance of various components of the system.

For example, heat can greatly affect the system hard drive. So if you have problems with the hard drive, it is better to pay attention to the temperature of your system first.

To know the system temperature and internal components, there are free software, which we want to introduce to you three of the best software in this field.

The best computer temperature measuring software

1- CrystalDiskInfo software

If you want to professionally check the system hard drive temperature, the best software available is CrystalDiskInfo software. This software is specially designed for hard drive and SSD health management.

The user interface of this software is very simple and on the other hand, it displays information about the health of the hard drive and SSD in a clear and understandable way. Among the features of CrystalDiskInfo software we can mention the following:

Temperature assessment of all system hard drives and SSDs

Estimate the overall health status of hard drives and SSDs according to each of them

Ability to check all read and write memories

You can download CrystalDiskInfo software from this link .

CrystalDiskInfo.png
View of CrystalDiskInfo software –

2- Core Temp software

Core Temp software, however, is fast, accurate and flexible software for measuring and monitoring the temperature of the laptop. This software is available for free for 32-bit and 64-bit Windows and as an installation or portable. But during installation, be sure to uncheck the installer comes with bundleware. Among the most important features and capabilities of this laptop heat measurement software, we can mention the following:

Display information in real-time and in real time

1- Ability to select sensors to display on the screen

2- Display notification when the temperature is too high

3- Checking the system for updating drivers and BIOS

You can download Core Temp system temperature measurement software for Windows for free from this link .

Core Temp.png
View of Core Temp software –

3- HWMonitor software

One of the most reliable system temperature measurement software is HWMonitor software. The free version of this software is really useful for normal use, but in any case, if you need very detailed information, you can buy a professional version called HWMonitor Pro. Mention the following:

1- Identify each sensor with voltage, fan and temperature

2- Save the data obtained from the temperature monitor and logging for troubleshooting

3- Checking the system to be informed about driver updates and BIOS

HWMonitor software for Windows is available in two versions 32-bit and 64-bit and both installed and portable.

HWMonitor.png
View of hwmonitor software –

There are other software in the field of system temperature measurement, among which we can mention Macs Fan Control , SpeedFan , Open Hardware Monitor , NZXT CAM and HWiNFO .

Which software do you have experience with and which do you prefer over others? Share your comments and experiences with us and other Facebook users .

]]>
http://wiki.shopingserver.com/introducing-the-top-3-software-for-measuring-computer-temperature/feed/ 0
How to enable incognito mode on Google Maps http://wiki.shopingserver.com/how-to-enable-incognito-mode-on-google-maps/ http://wiki.shopingserver.com/how-to-enable-incognito-mode-on-google-maps/#respond Sat, 10 Oct 2020 06:11:28 +0000 http://wiki.shopingserver.com/?p=28192 For almost a year now, Google has added incognito-mode to Google Maps. But how is this feature enabled? In this article, you will see how to do this.

 

Surely you are familiar with the anonymous mode feature in Chrome browser, Firefox, etc., which has been provided to protect users. Now, almost since last year, Google has been equipped with such a feature, but perhaps less attention. Now in this article, we are going to teach you how to activate this feature in Google Map.

Steps to enable incognito mode in Google Maps

Enabling incognito mode in Google Maps is very simple. To do this, just follow the steps below:

1- Enter the Google Map application on your phone and tap on your profile picture to display the settings menu.

2. Now you see that the first option in the menu is to turn on Incognito mode . Tap this option.

Enable incognito mode on Google Map.jpg
Steps to activate incognito mode in Google Map – 1 –

3. Now a window will appear that explains the features of incognito mode. By closing this window you will enter the incognito mode of Google Map.

Note that to use incognito mode Google Maps must close button or Close select If more options or learn more to choose from, you will exit incognito mode.

Steps to activate incognito mode in Google Map 2.jpg
Steps to activate incognito mode in Google Map –

How to turn on incognito mode in Google Maps

Here’s how you can turn on incognito mode in Google Maps:

  • Open the Google Maps app on your phone.
  • Tap on your profile picture.
  • Tap on Turn on Incognito mode option.

Turn on incognito mode on Maps

Follow the same procedure to turn off the incognito mode. Once you turn on the incognito mode, you won’t receive any personalized suggestions or notifications.

Incognito mode

This is quite nice for when you’re traveling or searching for some secret places. As mentioned before, this mode is currently available on the Android app. We’ll notify you once it’s available on iOS as well.

]]>
http://wiki.shopingserver.com/how-to-enable-incognito-mode-on-google-maps/feed/ 0
Nearby Share feature introduced for Android; File transfer faster and more secure than ever http://wiki.shopingserver.com/nearby-share-feature-introduced-for-android-file-transfer-faster-and-more-secure-than-ever/ http://wiki.shopingserver.com/nearby-share-feature-introduced-for-android-file-transfer-faster-and-more-secure-than-ever/#respond Sat, 10 Oct 2020 05:51:09 +0000 http://wiki.shopingserver.com/?p=28189 After a long wait, we finally saw the introduction of the NearBy share feature for Android an hour ago. This feature is currently available for a number of Google and Samsung Pixel phones and will soon be available to all Android phones above 6.0.

After a long wait, an hour ago Google finally introduced the Nearby Share feature, which is a competitor to AirDrop, for the Android operating system, and now some users of Pixel and Samsung phones can use this feature to quickly send their files to nearby devices. To use.

This feature is available on Android 6.0 and above for Android users to send files, images, videos, links, etc. to their nearby devices at high speed and with security. 

Using this feature is very simple and in fact a list of devices around you that support Nearby Share is displayed that by selecting one of these devices, you can transfer your data to the device you want.

 Of course, on the recipient side, a notification is displayed that the other party can accept and receive your file. Now the Nearby Share feature will automatically select the best option from the available protocols such as Bluetooth, Bluetooth Low Energy, Peer to Peer Wi-Fi, etc., and even if you are not connected to the Internet.

Ability to share nearby.jpg

In designing this feature, special attention has been paid to privacy so that you can send or receive files anonymously. You can also specify that you hide from certain contacts.

This feature will also be available for Chromebooks in the coming months, so you will soon be able to share your files between Android and Chromebook easily and quickly. So it will be very easy to communicate between Android and Chromebook.

As we said, a number of Google Pixel and Samsung phones are the first Android phones to receive Nearby Share feature from today. But this trend will continue until the coming weeks, and soon all Android phones above 6.0 will benefit from this feature.

Nearby_CHROME.png
]]>
http://wiki.shopingserver.com/nearby-share-feature-introduced-for-android-file-transfer-faster-and-more-secure-than-ever/feed/ 0
How to activate Instagram Dark Mode? http://wiki.shopingserver.com/how-to-activate-instagram-dark-mode/ http://wiki.shopingserver.com/how-to-activate-instagram-dark-mode/#respond Sat, 10 Oct 2020 05:48:06 +0000 http://wiki.shopingserver.com/?p=28185 One of the most useful features of Instagram is the dark theme mode or the dark mode of Instagram. But how to enable this feature in Android and iOS?

Instagram Dark Modeis one of the most popular social networks in the world, which also has many fans in our country. Recently, this social network has been equipped with a feature called Dark Mode. But what is the use of It and how is it activated?

Instagram Dark Mode application

This feature is originally designed with the aim that users who want to use the phone at night and in the dark, not only do not create a lot of light, but also do not damage the eyes due to this light. In fact, this dark theme makes the blue light less harmful.

On the other hand, this feature makes the separation of colors in the Instagram environment, which is full of photos and videos, better.

However, another positive point about activating this feature is that it significantly reduces the phone’s battery consumption. However, we recommend that you use this feature on your phone and on Instagram, which itself consumes a lot of battery.

Activate Instagram Dark Mode on Android

To use this feature on Android phones, you must first make sure you have the latest version of Instagram installed on your phone. Then just follow the steps below:

1- Enter the setting section and tap on the Theme option .

2. Now select the Dark option .

It is simply activated for you.

Activate Instagram Dark Mode on iOS

Keep in mind that you must have at least iOS 13 to enable the Instagram Dark theme on iOS. Also have the latest version of Instagram installed on your phone. Now follow the steps below:

1- On iPhone on Instagram, go to Settings> Display & Brightness .

2- Now you can set the dark mode to ON or OFF.

3- You can also set it to automatic mode to change itself to dark or light depending on the ambient light. Of course, you can also manually program for this mode.

Instagram Dark Mode is easily activated for your iPhone. Of course, iOS itself allows you to generally put the phone in dark mode.

]]>
http://wiki.shopingserver.com/how-to-activate-instagram-dark-mode/feed/ 0
5 reasons that slow down the phone’s battery charging speed http://wiki.shopingserver.com/5-reasons-that-slow-down-the-phones-battery-charging-speed/ http://wiki.shopingserver.com/5-reasons-that-slow-down-the-phones-battery-charging-speed/#respond Sat, 10 Oct 2020 05:41:33 +0000 http://wiki.shopingserver.com/?p=28182 If you have been suffering from slow phone charging for some time and you are looking for the reason for this problem, follow this article.

If you have trouble charging your phone, you must have asked yourself over and over again why my phone charges late. So we decided to mention in this article 5 main reasons that cause the phone to charge late.

5 reasons that reduce the speed of charging the phone battery

1- Inappropriate accessories

One of the most important reasons why the phone’s battery charge speed is so slower than before, is not related to the phone itself, but to the accessories with which you charge the phone. In fact, it is better to look for the cause in something like an improper adapter or a poor power supply before anything else.

USB cables can be used on most phones, so they can be severely damaged, stretched, folded, or even damaged by high temperatures. So before doing anything, first change your USB cable and check if the problem is fixed or not. The next step is to test your adapter.

The best option is to go for chargers that are exactly right for your phone, and preferably get the charger from reputable stores. Otherwise, your charger may not be able to charge your phone as quickly as expected.

2- Port problem

Your charger is not the only device that may slow down your phone charging process; But the problem of the phone port can be another reason for slowing down the phone charging speed. In the first step, look at the port and check that it is not blocked or corroded. If there are no such problems, check the inside of the port with a flashlight and try to carefully clean the inside of the port from any contamination such as dust, but be careful not to damage the port.

3- Background applications

Sometimes the problem with slow charging the phone is not related to the hardware but the running of various applications in the background that causes this to happen. Both Android and iOS have tools that let you know which apps are running in the background. On Android phones, just go to the battery section in the setting section (on some devices, you may find the Device care option). The same is true for iOS, and you should go to the Battery section in the settings section to find out which apps use the most battery.

Of course, do not forget that some of these programs consume a lot of battery power because you use them more. So be sure to pay attention to the usage time of the program and look for programs that have the highest battery consumption with the least amount of use. It is better to remove these programs and see if the battery charge speed changes or not?

4- Battery wear and tear

If you have been using your phone for 2 or 3 years and have used it heavily during this time, it is not uncommon for the battery to slow down and it may be really time to replace the phone battery. In fact, lithium-ion batteries do not work forever and can only be charged and discharged a limited number of times. Of course, most cell phone batteries are now non-removable and difficult to replace, but this may be the last way for your phone to survive.

5- Your wrong behavior; Working with the phone while charging

Are you one of those people who use it while charging the phone? Well, you are probably the main reason for your problem. Apps like Facebook use a lot of battery power, and using these apps while charging can drastically slow down the charge.

]]>
http://wiki.shopingserver.com/5-reasons-that-slow-down-the-phones-battery-charging-speed/feed/ 0
Why is it essential to know the basics of information security http://wiki.shopingserver.com/why-is-it-essential-to-know-the-basics-of-information-security/ http://wiki.shopingserver.com/why-is-it-essential-to-know-the-basics-of-information-security/#respond Sat, 10 Oct 2020 05:37:02 +0000 http://wiki.shopingserver.com/?p=28178 The importance of information security today is not hidden from anyone who works in the field of information technology. Websites, various software, and networks are all constantly under threat,

and these threats and vulnerabilities are often addressed when a successful attack occurs but the incident must be remedied before it occurs.

Information security Because potential security threats can occur and cause damage at various levels, it is essential for a large portion of IT professionals to be familiar with the basics of information security.

Software developers have sufficient knowledge of information security to eliminate vulnerabilities in their products and to be able to identify where the problem is in the event of an attack.

Network administrators need to have enough information about the basics of information security to apply the necessary security protocols and be aware of existing vulnerabilities, not based on conventional rules and stereotypes, but precisely based on their network conditions and needs.

They must be able to prioritize threats, and in the event that a network is attacked,

they must be able to respond to threats as quickly as possible and minimize damage.

Many resources are available on various topics related to information security.

In some of these sources, it is enough to mention the do’s and don’ts without giving the audience a basic knowledge about why these do’s and don’ts,

and there are other categories of resources that are so specialized and detailed that not everyone can study them.

The Facebook website plans to publish a collection of articles on information security fundamentals.

This series of articles tries to explain the key and basic issues related to information security,

so that the reader acquires sufficient knowledge about the various security protocols and tools and knows how each works and On what basis are they designed?

 Knowing this, the strengths and weaknesses of each can be identified and each tool is used in the right place and in the right way.

At the same time, addressing theoretical issues should not prevent one from engaging with real and practical issues. This series of articles, which will be gradually published on the Physite website, is written with such an approach.

This series covers articles on encryption, access control, security protocols, and software, respectively. The main reference in preparing these articles is the second edition of Information Security Principles and Practice.

This book is used as an academic reference in information security courses. The author of this book, Mark Stamp, is a professor at the University of San Jose in the United States and has written this book after 20 years of work in the field of information security.

 

]]>
http://wiki.shopingserver.com/why-is-it-essential-to-know-the-basics-of-information-security/feed/ 0
Familiarity with the key concepts of information security http://wiki.shopingserver.com/familiarity-with-the-key-concepts-of-information-security/ http://wiki.shopingserver.com/familiarity-with-the-key-concepts-of-information-security/#respond Sat, 10 Oct 2020 05:29:42 +0000 http://wiki.shopingserver.com/?p=28176 We have already read in the zero part of the collection of articles on the basics of information security why having knowledge of information security is a necessity for all IT activists.

Confidentiality and accuracy of information and accessibility are the basic concepts that we want to address in the continuation of the collection of articles teaching the basics of information security. In these articles, we look at ways to ensure that these conditions are met. But first we must have a clear understanding of the definition of these words to know exactly what goals we are seeking to achieve.

Welcome to Jafar Bank

Meet the characters that are going to accompany us in these articles.

Jafar - Manager of Jafar Bank

This is Jafar. Jafar has recently set up a bank called Jafar Bank.

Morteza - a normal user

This is Morteza. Morteza is one of the people who has an account in Jafar Bank. He uses Jafar Bank online system to perform transactions and receive financial reports. He is a law-abiding and ordinary user and never takes any action that damages the system.

Javad - Hacker and information security specialist

Unlike Morteza, Javad, whom you see in the picture above, is always looking to damage the system. He intends to harm Jafar in any way possible. You are looking for solutions that can stop Javad.

Confidentiality

Confidentiality means preventing information from being read without permission. For example, the balance of Morteza’s account in Jafar Bank is confidential information, if Javad can read this information, the confidentiality of the information is endangered.

To maintain the confidentiality of your information, you must ensure that any information is readable only by authorized persons.

Information Integrity

You should always make sure that the information in your system is correct. To do this, it must not be possible to write information without permission, or at least write information without permission must be recognizable so that you can identify which information in the system is incorrect.

Information integrity, then, means preventing unauthorized writing or at least detecting unauthorized writing.

Note that the accuracy of the information and the confidentiality of the information should not be confused. Javad may not be able to read the balance of Morteza’s account, in which case the confidentiality of the information is preserved,

but if he can replace the amount saved as the balance of Morteza’s account with a new value, then the accuracy of the information is compromised.

Availability

DOS attacks or denial of access are relatively new attacks. In these attacks, access to the system becomes impossible without disclosing confidential information or altering existing information. Javad,

who cannot be informed of the confidential information in the system and cannot destroy the accuracy of the information, may want to block access to Jafar Bank’s online system.

In this case, Morteza loses his trust in Jafar Bank and withdraws his money and opens an account in another bank.

You need to make sure that systems and information are always accessible while maintaining the confidentiality and accuracy of the information.

Authentication

Consider Morteza turning on his laptop and using it to make a transaction in Jafar Bank online system. In the first stage, how should Morteza laptop know that the person who works with the laptop is Morteza?

In a single computer, this is usually done by assigning a password to users, and encryption methods are used to make this process secure.

And In the next article, we will look at cryptography.

The process by which we verify a user’s identity is called Authentication. Morteza’s laptop has a password that only Morteza knows, so when he enters the password correctly, it becomes clear that the person using the laptop is really Morteza.

But network authentication faces more threats. For example, Javad may be able to eavesdrop on messages exchanged on the network. He may also be able to manipulate them. Suppose he can resend one of the previous messages sent by Morteza to Jafar Bank.

In this case, he may be able to introduce himself as Morteza. This type of attack is called a Man in the middle attack, which we will cover in later articles.

To prevent this from happening, the exchange of messages must be done exactly according to certain protocols. This means that the composition and order of the messages exchanged is very important and must follow a certain pattern. Encryption methods also have wide applications in the network-based authentication process.

Authorization

After Morteza’s authentication process was done correctly in Jafar Bank’s online system and it was verified that the person claiming to be Morteza is really Morteza, what information should be made available to him?

After authentication, permissions and permissible behaviors should be restricted, for example, Morteza should not be able to access the account balance. But Jafar, as the bank manager, can access the account balance of Morteza and Ali.

The mechanism that imposes restrictions on authenticated users is called Authorization.

Now that you are familiar with the key definitions of information security, it is time to know how each of these goals is met. What are the mechanisms to achieve these goals?

In the next few articles , we will get acquainted with one of the most important security mechanisms by entering the world of cryptography .

]]>
http://wiki.shopingserver.com/familiarity-with-the-key-concepts-of-information-security/feed/ 0
Introduction to cryptographic knowledge – Cryptography http://wiki.shopingserver.com/introduction-to-cryptographic-knowledge-cryptography/ http://wiki.shopingserver.com/introduction-to-cryptographic-knowledge-cryptography/#respond Sat, 10 Oct 2020 05:26:01 +0000 http://wiki.shopingserver.com/?p=28174 After getting acquainted with the basic concepts of information security, we want to enter the topic of cryptography and get acquainted with different methods of cryptography.

Cryptography, In the previous article of the Proceedings of the principles of information security with the key concepts of information security were introduced.

In this article, we start the topic of cryptography, and after getting acquainted with the basic definitions in this field, we examine the simple substitution method to use it to say what is meant by a secure cryptography method.

Remember these words

First of all, it is better to get acquainted with the definition of these words. Knowing these terms will help you to know exactly what they mean, especially if you come across them in specialized texts, and secondly, if you want to read more about these topics, you know exactly what phrases to look for.

Cryptology : Knowledge of making and breaking secret codes.

Cryptography : Knowledge of creating secret codes.

Cryptanalysis : Knowledge of breaking secret codes

You may also come across the word Crypto in specialized texts, which can mean any of the above three words. Depending on the text, you can tell which meaning is meant.

One crypto system ( Crypto System – Cipher ) receives the original data as input and returns another data as output, which is equivalent to the encrypted original data. So the original data as input to the system is encrypted plain text ( Plain text ) say and the encryption system output ciphertext ( Cipher text ) is called.

A procedure that converts plain text to ciphertext Encryption ( Encryption ) and it’s contrary to the plain text into ciphertext decryption ( Decryption ) is called. Also in the operation of a key ( Key) Is also used to configure the cryptographic system. The following figure gives a better understanding of the above definitions.

Encryption and decryption operations

Cryptographic methods are divided into two general categories, symmetric and asymmetric.

In symmetric encryption ( Symmetric cipher ) is a key for encryption and decryption operations.

When using this method, the key must be kept confidential because anyone who has access to the key can convert the ciphertext to plain text. Unlike the procedure in asymmetric cryptography ( Asymmetric ) of the two keys are used.

One key to encrypt information and the other key to decrypt. When this encryption method is used, the key used for decryption is usually made available to the public and the other key is kept confidential. That’s why these two keys, public key ( Public Key ) and the private keyPrivate Key ) is called.

When someone uses public key to decrypt information, they can ensure that the information is encrypted by the same person who holds the private key and is not manipulated by someone else. In this way encryption, encrypted with the public key ( Public key encryption ) is also called.

In an encryption system ideal ( Ideal Cipher ) to obtain the plaintext and ciphertext using the keyless impossible.

The security of a cryptographic system must be key-based. For added security, details of how the cryptographic system works should not be hidden. In fact, everyone should be able to have accurate information about how the cryptographic system works, and all that needs to be hidden is the key. This is known as the Kirkhoff principle , which should be considered in the design of cryptographic systems.

Substitution Cipher

You must remember Jafar, Morteza and Javad from the first article.

Jafar and Morteza's messages are heard by JavadMorteza wants to send a message to Jafar Bank and in this message his transaction information is written. Jawad Ibn is able to listen to the messages exchanged. For this reason, Morteza can not send the original message to Jafar Bank.

You have to provide him with an encryption system so that even if the message being exchanged is in Javad’s possession, Morteza’s account information will not be revealed.

To do this we can use a simple encryption system called substitution cipher ( Substitution Cipher ) use.

In this cryptographic system, we use another letter instead of each letter of the alphabet. In its simplest form, instead of each letter of the alphabet, we use another letter that is a certain number after that letter. And In this case, the space between the main letter and the letter that replaces it is used as the encryption key.

The following figure shows how to replace the letters.

In this example, instead of each letter, the letter in the alphabetical order of 3 is used, so here is the cryptographic key 3.

Letter substitution in cryptography Simple key substitution 3This encryption system is known as Caesar encryption when used with key 3. In ancient Rome, this method was used to encrypt confidential information.

According to the figure above, if n = 3 is used as the encryption key Message: thisismorteza is encrypted as WKLVLVPRUWHCD. To decrypt it, it is enough to do the opposite. That is, instead of each letter in the encrypted message, we put the 3 letters before it in alphabetical order.

By doing this, can we be sure that if Javad receives the encrypted message, he will not be able to understand the content of the original message?

Another issue that needs to be taken as the key ( Key Space ) is. Key space means all values ​​that may be used as encryption keys. In the simple substitution cryptography method we examined, in English, given that there are 26 letters in the alphabet, the key can have values ​​from 0 to 25. As a result, the size of the key space in this method is equal to 26.

Thus, if Javad knows that simple substitution encryption has been used, in order to obtain the encryption key, he must try all 26 possible values ​​to obtain the key. It’s not difficult to try all these 26 keys. So we can not say that this encryption mechanism provides sufficient security.

This type of attack where all the switches are looking for real value encryption key is searched comprehensive search key ( Exhaustive search key ) is called.

How big should the key space be?

We have seen that simple substitution encryption is not a good way to encrypt information,

because there is only one value that can be used as a key, and thus anyone who wants to break this encryption only needs to use these 26 values ​​as a one-to-one key. Do an experiment to find the right key.

But how big does the key space really have to be to make sure encryption can’t be attacked this way?

Suppose Javad’s computer has enough computing power to test 2.40 keys per second.

In this case,

if the number of possible keys is 2.5 x 56, it only takes 2.16 seconds, which is about 18 hours for Javad to try all possible keys and find the right key.

Similarly, if the size of the key space reaches 2.64 , it takes more than 6 months, and with a key space of ^ 128 بیش more than 90 trillion centuries, it takes Javad to try all the possible keys with his computer.

So we need to make a change to the simple replacement encryption method to make the key space large enough. To do this, we change the way letters are substituted so that each letter can replace any other letter.

This means that we can have 26 choices to choose which letter to use instead of the letter a,

and then we will have 25 choices to choose the successor to the letter b (obviously we can not choose the letter that replaces the letter a) And so to select the 26 key! That means we have about 2.88 options.

This key space is large enough that Javad can not find the cryptographic key by trying all the keys. The following figure is an example of a key in this encryption method.

Encryption key in succession encryption

Cryptanalysis

We said that cryptanalysis or Cryptanalysis of cracking. Now we want to see with a simple example what it is like to break a cryptographic method. Suppose Javad succeeds in listening to this message:

Message heard by JavadGiven that the cryptographic key can be any permutation of English letters, it is not possible for Javad to try all possible keys. So he has to use a smarter way to get to the content of the message.

The following is a graph of the frequency of letters in English.

Chart of frequency of letters in EnglishAnd this figure is a diagram of the frequency of letters in the message that Javad overheard.

Graph the frequency of letters in the message heardLooking at these messages and diagrams, one can guess that the letter F is used in the encrypted message instead of the letter e.

The first word is usually easier to guess than any other word.

Looking at the diagrams and knowing that the third letter was actually e instead of F, one can guess that the first word in the main message was the.

With this assumption in mind, the other two letters of the message are identified and can be used to find the next letters.

Something like solving a table.

Finally,

by continuing the same method, Javad can decrypt the message or make the remaining part of the key so small that it is possible to get the right key by trial and error.

So large key space, although necessary to have a secure encryption method, is not enough. How do we ensure a cryptographic method is secure?

What is meant by safe Cryptography?

If we can have a mathematical proof that it is not possible to get from encrypted text to plain text without a key,

we can be sure that the cryptographic method we use is secure. But such proof usually does not exist.

No such proof has been provided for any of the most widely used cryptographic methods.

In the absence of a mathematical proof of cryptographic system security,

if the best known attack on a cryptographic method is not computationally possible, we can consider that cryptographic system to be reliable.

In the series of articles where the term secure ( Secure ) encryption system used for an attack,

we mean is best known for its encryption system nearly as comprehensive search key ( Exhaustive key search ) requires time and computing power.

 

 

]]>
http://wiki.shopingserver.com/introduction-to-cryptographic-knowledge-cryptography/feed/ 0
Fundamentals of Information Security – OTP Encryption and cryptography http://wiki.shopingserver.com/fundamentals-of-information-security-otp-encryption-and-cryptography/ http://wiki.shopingserver.com/fundamentals-of-information-security-otp-encryption-and-cryptography/#respond Sat, 10 Oct 2020 05:17:48 +0000 http://wiki.shopingserver.com/?p=28171 In the previous article, we started with cryptography. After getting acquainted with the basic definitions of cryptography, now in this article we are going to describe the One Time Pad cryptography method.

Cryptography, This is one of the few cryptographic methods that can be proven to be secure.

In a previous article from the Introduction to Information Security Fundamentals series , we learned the basic definitions of cryptography.

Do you remember that Morteza wanted to send a message to Jafar Bank, but because Javad might have overheard Pabamha, he had to use an encryption method to send his message in encrypted form.

To do this , we reviewed the surrogate encryption method and saw how this encryption could be broken using encryption analysis methods.

 In this article, we describe One Time Pad encryption. A cryptographic method that has been proven to be secure.

Morteza, who recently worked as a spy in Nazi Germany, wants to send an encrypted message to Jafar, who is in charge of his superior. He wants to use One Time Pad encryption to encrypt his message. Javad, a spy for the Soviet Union, also intends to eavesdrop on the message and crack the code.

Morteza, Jafar and JavadTo make our job easier, we consider only the first part of Morteza’s message. This message starts with the phrase heilhitler. To use One Time Pad encryption, we assign a binary code to each letter of the code.

Because in this example we are dealing with only 8 letters of the alphabet, we can assign a 3-bit code to each letter as follows.

Base code attributed to lettersThese codes provide only a mapping of the alphabet to three-bit strings and should not be kept confidential. Using them here is something like using ASCII encoding.

In the previous article, we said that in a cryptographic method, there should be nothing secret other than the cryptographic key. We introduced this issue as the Karkhoff principle .

In this way, Morteza’s message (heilhitler phrase) becomes the following bit string:

001 000 010 100 001 010 111 100 000 101

How does One Time Pad encryption work?

Now Morteza has to encrypt his message using One Time Pad encryption. To do this, we need a key that is exactly the same length as the message. This key must be selected randomly. Morteza uses the following bit string as a key:

111 101 110 101 111 100 000 101 110 000

In the One Time Pad encryption method, to generate encrypted text or Cipher Text, we plain text with the XOR encryption key. One of the features of XOR operation is that:

a XOR b XOR b = a

For this reason, if the encrypted text (Cipher Text) is entered with the XOR encryption key, it will be the result of plain text operations. In this way, the encryption and decryption methods are exactly the same.

So Morteza’s message will be encrypted as follows:

Encryption with One Time PadEncrypted message means that the phrase srlhssthsr can be transmitted quite safely, without the listener of the message knowing anything about the content of the message.

The listener can only understand the length of the main message, but this problem can also be solved by using creative methods.

Jafar, who has the cryptographic key, repeats the same operation after receiving the message and obtains the main message.

Decryption with One Time PadIf we decrypt the same encrypted text with another key, the simple message we get is completely different. Imagine using the following bit string as an encryption key to decrypt the srlhssthst message:

101 111 000 101 111 100 000 101 110 000

Decryption with wrong key in One Time Pad.pngAs you can see, the result is killhitler instead of heilhitler. Without knowing the key, any phrase with the same length can probably be exactly the same as the main message.

As a result, without knowing the key and holding the encrypted message, no guess can be made about the main message. This means that this encryption method is completely secure. But provided that each key is used only once.

Why is the One Time Pad encryption key disposable?

Suppose the two messages P1 and P2 are both encrypted with the K key.

C1 = P1 XOR K

C2 = P2 XOR K

C1 XOR C2 = P1 XOR K XOR P2 XOR K = P1 XOR P2

The above statement indicates that if the same cryptographic key is used twice, information about the original message can be found. In this case, it is enough to reveal only a part of one of the messages or guess correctly, so that the encryption is broken and more information about the main messages without a key is obtained.

For example, if both kite and like are both encrypted with a key:

like.pngkite.pngThe person listening to the messages can guess that the second and fourth letters of both messages are the same. Breaking the encryption by revealing the details of the messages can be as simple as solving the table.

Why can’t One Time Pad encryption be used for today’s applications?

We saw that the encryption key in the One Time Pad encryption method needs to be changed each time, and the length of this key should be the same size as the original message.

Choosing a key of this length is practically very challenging in today’s applications dealing with very large data, and transmitting a key of this size to any message is not safe to do.

Therefore, this method of cryptography, although it offers very good security, but can not be used in most applications today. But knowing this helps to understand the cryptographic methods used today.

Challenge your findings

At the end of the third article in the collection of information security basics,

it is not bad to review a little of what we have learned in these three articles.

If you are familiar with programming languages, you can implement successor cryptography or One Time Pad cryptography.

You can also think of creative ways to prevent message length from being revealed

in One Time Pad encryption and implement the way you think.

In the next article, we will look at the cryptographic methods used in the computer world today and learn how they work.

]]>
http://wiki.shopingserver.com/fundamentals-of-information-security-otp-encryption-and-cryptography/feed/ 0