Fig 4 - uploaded by Debagnik Kar
Content may be subject to copyright.
3: Flowchart of encryption for AES-256 algorithm

3: Flowchart of encryption for AES-256 algorithm

Source publication
Thesis
Full-text available
Privacy has become a major concern for the end-user of free services provided by technology giants like Facebook and Google, the scandals like Cambridge Analytica or data leaks by Google + has taught us about the dangerous impacts of data falling into the wrong hands. Here I designed an end-to-end encrypted chatting application to address this issu...

Similar publications

Article
Full-text available
According to Facebook (2016), "context collapse," the decline of personal and original content sharing on its social media site, is on the rise. "Context collapse" refers to an infinitely possible online audience contrasted to the limited groups a person normally interacts with face-to-face. This paper explores the construct of "context collapse,"...

Citations

... Referendum. Data breach scandal of Google+ (previously named Google Buzz later renamed to Google Currents) which led to leak 500,000 user's private data and compromised 52.5 million private account of Google users like username and password, this led Google to shut down the services of Google+ for free user accounts [60] All these example has taught us that private information is very sensitive and is very dangerous if fallen in the wrong hands, that is why security of these system from both the service consumer and the service provider must know the how to secure their network and have the knowledge of bugs and security loophole their service provides that can patched before someone else can exploit them for malicious purposes. ...
... TCP also provides process to process communication using port numbers [60]. ...
... UDP uses checksums to provide data integrity, it is generally used in time sensitive applications where the priority is not the loss of a few packets but the time delay should be minimal. UDP was designed by David P. Reed in 1980 [60]. A UDP sample packet is visualised in fig 2.3 ...
Conference Paper
Full-text available
Capture the flag (CTF) is a kind of cybersecurity puzzle that challenges a hacker to solve various tasks ranging from finding security loopholes to basic programming exercises to exploit into accessing a server to steal data. These tasks usually ask the contestant to find one or more pieces of texts that may be hidden in the victim server machine or a webpage hence the name Capture the Flag where the flag is the hidden text. In information security, a CTF requires a range of hacking, pen-testing, various programming language, code injection, cross-site scripting, reverse engineering, and various more hacking knowledge. This lab assigned to us named HA: Infinity Stone CTF uploaded by “Hacking Articles” on Vulnhub website on September 16th, 2019[3], the author of the CTF Mr. Raj Chandel, Director of “Hacking Article” gave a hint in the CTF “ENUMERATION IS THE KEY!!!!”. The CTF is based on a Hollywood movie franchise based on a comic book series named Infinity War of the movie franchise Marvel Cinematic Universe based on the Marvel comics The Avengers. The hidden flags in the CTF machine are the six infinity stones that the mentioned movie features, the challenge is to find those infinity stone flags and their values from the victim machine.