Skip to main content

THM | Encryption - Crypto 101

· 4 min read

Cryptography | Encryption - Crypto 101 | Summary:

This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the Encryption - Crypto 101 room.


Disclaimer: Please note that this write-up is NOT intended to replace the original room or its content, but rather serve as supplementary material for those who are stuck and need additional guidance.

Task | 01 | What will this room cover?

Question 1: I'm ready to learn about encryption

No answer needed

Task | 02 | Key terms

Question 1: I agree not to complain too much about how theory heavy this room is.

No answer needed

Question 2: Are SSH keys protected with a passphrase or a password?

passphrase

Task | 03 | Why is Encryption important?

Question 1: What does SSH stand for?

Secure Shell

Question 2: How do webservers prove their identity?

certificates

Question 3: What is the main set of standards you need to comply with if you store or process payment card details?

PCI-DSS

Task | 04 | Crucial Crypto Maths

Question 1: What's 30 % 5?

0

Question 2: What's 25 % 7

4

Question 3: What's 118613842 % 9091

3565

Task | 05 | Types of Encryption

Question 1: Should you trust DES? Yea/Nay

Nay

Question 2: What was the result of the attempt to make DES more secure so that it could be used for longer?

Triple DES

Question 3: Is it ok to share your public key? Yea/Nay

Yea

Task | 06 | RSA - Rivest Shamir Adleman

Question 1: p = 4391, q = 6659. What is n?

29239669

Question 2: I understand enough about RSA to move on, and I know where to look to learn more if I want to.

No answer needed

Task | 07 | Establishing Keys Using Asymmetric Cryptography

Question 1: I understand how keys can be established using Public Key (asymmetric) cryptography.

No answer needed

Task | 08 | Digital signatures and Certificates

Question 1: What can you use to verify that a file has not been modified and is the authentic file as the author intended?

Digital Signature

Task | 09 | SSH Authentication

Question 1: I recommend giving this a go yourself. Deploy a VM, like Linux Fundamentals 2 and try to add an SSH key and log in with the private key.

No answer needed

Question 2: Download the SSH Private Key attached to this room.

No answer needed

Question 3: What algorithm does the key use?

RSA

Question 4: Crack the password with John The Ripper and rockyou, what's the passphrase for the key?

delicious

Task | 10 | Explaining Diffie Hellman Key Exchange

Question 1: I understand how Diffie Hellman Key Exchange works at a basic level

No answer needed

Task | 11 | PGP, GPG and AES

Question 1: Time to try some GPG. Download the archive attached and extract it somewhere sensible.

No answer needed

Question 2: You have the private key, and a file encrypted with the public key. Decrypt the file. What's the secret word?

Pineapple

Task | 12 | The Future - Quantum Computers and Encryption

Question 1: I understand that quantum computers affect the future of encryption. I know where to look if I want to learn more.

No answer needed