This article kicks things off by explaining that this isn’t a deep dive or an advanced cryptography course or class. It’s more of a practical, beginner-friendly guide to help folks get started in cybersecurity. The video blends modern encryption methods with older, historical ones and walks through live examples using TryHackMe labs including TryHackMe Cryptography basics, TryHackMe Public Key cryptography and TryHackMe Hashing.

Core Definitions in Cryptography

To build a solid base, the video explains key terms:

Key: A secret code needed to turn the scrambled message back into something readable. Without the key, the cipher’s useless.

Plaintext: The original message. Something you can read, like an email or note.

Ciphertext: What the message looks like after it’s scrambled by encryption.

Cipher: The formula used to mess with the message—like AES or others.

Classical Ciphers and Why They’re Weak

The Caesar Cipher gets used as an example here. It’s a very old trick where each letter shifts forward by a set number. To decode, you shift the other way. Easy to break, though—only 25 possible keys in English. Anyone could try them all quickly.

How Symmetric Encryption Works

This method uses one key to lock and unlock. That’s handy, but risky too—how do you share that one key safely?

DES/3DES: Outdated, mostly retired now.

Examples: DES, 3DES, and AES.

AES: Still strong today, with longer key options.

Asymmetric Encryption: Stronger but Slower

Here, two keys get used—a public one and a private one. One scrambles the message, the other unscrambles it.

Diffie-Hellman: Mainly helps with swapping keys in a safe way.

RSA: Old-school and secure but runs slow because of big keys.

ECC: Does the same job with smaller keys.

Math That Makes It All Work

XOR: A math operation used in encryption; it flips bits based on whether they match.

Modulo: Used to find remainders—critical when making asymmetric keys.

Diffie-Hellman Key Exchange in Real Life

Here’s how it goes down:

  1. Both sides agree on two public values (P and G).
  2. Each person picks a private number.
  3. They do some math to make public keys.
  4. They swap keys.
  5. Then use those to get to a shared secret. That shared secret? Never actually sent.

SSH Keys and Server Access

Asymmetric encryption powers SSH too. When you connect to a server for the first time, you see a fingerprint. Accept it, and next time your computer checks it quietly.

  • You can make SSH keys on your machine.
  • The server keeps a copy of your public key in a file called authorized_keys.
  • Make sure your file permissions are set right or SSH won’t work.

Digital Signatures Make Things Trustworthy

Here’s the idea:

  • Bob signs a document by encrypting its hash with his private key.
  • Alice checks it by using Bob’s public key.
  • If everything matches, she knows Bob signed it and it hasn’t been changed.

This works kind of like HTTPS certificates, which prove websites are legit thanks to trusted authorities.

Encrypting and Signing with GPG

You can set an expiration date and a passphrase to protect the key.

You can make your own keys.

Encrypt and decrypt files easily.

Encrypted files usually end in .gpg.

Hashing for File Integrity

Hashing creates a fingerprint for files. A small change in the file creates a totally different hash. You can’t reverse it back to the original file—hashing’s only for checking things, not hiding them.

  • Good Hashes: SHA256.
  • Weak Hashes: MD5 and SHA1—they’ve got flaws and can collide, meaning two different files might share the same hash.

TryHackMe exercises give you hands-on practice using hashes to verify files and learn how it works.

RSA Encryption Explained

RSA encryption sits at the center of asymmetric cryptography—it’s all about using two keys that work together but do different things. Here’s the breakdown of how it keeps your secrets safe.

Encrypt with Public, Decrypt with Private

Let’s say Alice wants to send Bob a message. She uses Bob’s public key to scramble the message. That public key? It’s out there for anyone to use—no harm in sharing it.

But here’s the trick: once that message’s encrypted, only Bob’s private key can unlock it. That private key is his and his alone. It stays hidden. Always.


Why This Works

Even if someone grabs the scrambled message while it’s traveling through the internet—even if they’ve got Bob’s public key and know RSA like the back of their hand—they still can’t read it. Why? Because cracking RSA means solving a seriously hard math problem. The kind that would take current computers way too long to figure out.


The Math Behind It

RSA depends on how hard it is to break down huge numbers into their prime parts. You multiply two giant primes to make a number that goes into the public key. That’s easy. But going backward—figuring out the original primes from that big number? Takes forever without the right tools. That’s what keeps the private key safe.


So bottom line? RSA lets people share information out in the open without risking privacy. Encrypt with the public key. Only the matching private key can open it. Simple in concept. Super secure in practice.

TryHackMe Cryptography Basics Room Answers

What is the standard required for handling credit card information?

PCI DSS

What do you call the encrypted plaintext?

ciphertext

What do you call the process that returns the plaintext?

decryption

Knowing that XRPCTCRGNEI was encrypted using Caesar Cipher, what is the original plaintext?

ICANENCRYPT

Should you trust DES? (Yea/Nay)

Nay

When was AES adopted as an encryption standard?

2001

What’s 1001 ⊕ 1010?

0011

What’s 118613842%9091?

3565

What’s 60%12?

0

TryHackMe Public Key Cryptography Basics Room Answers

In the analogy presented, what real object is analogous to the public key?

Lock

Knowing that p = 4391 and q = 6659. What is n?

29239669

Knowing that p = 4391 and q = 6659. What is ϕ(n)?

29228620

Consider p = 29, g = 5, a = 12. What is A?

7

Consider p = 29, g = 5, b = 17. What is B?

9

Knowing that p = 29, a = 12, and you have B from the second question, what is the key calculated by Bob? (key = Ba mod p)

24

Knowing that p = 29, b = 17, and you have A from the first question, what is the key calculated by Alice? (key = Ab mod p)

24

Check the SSH Private Key in ~/Public-Crypto-Basics/Task-5. What algorithm does the key use?

RSA

What does a remote web server use to prove itself to the client?

Certificate

What would you use to get a free TLS certificate for your website?

Let’s Encrypt

Use GPG to decrypt the message in ~/Public-Crypto-Basics/Task-7. What secret word does the message hold?

Pineapple

TryHackMe Hashing Basics Room Answers

What is the SHA256 hash of the passport.jpg file in ~/Hashing-Basics/Task-2?

77148c6f605a8df855f2b764bcc3be749d7db814f5f79134d2aa539a64b61f02

What is the output size in bytes of the MD5 hash function?

16


If you have an 8-bit hash output, how many possible hash values are there?

256

What is the 20th password in rockyou.txt?

qwerty

Manually check the hash “4c5923b6a6fac7b7355f53bfe2b8f8c1” using the rainbow table above.

inS3CyourP4$$

Crack the hash “5b31f93c09ad1d065c0491b764d04933” using an online tool.

tryhackme

Should you encrypt passwords in password-verification systems? Yea/Nay

Nay

What is the hash size in yescrypt?

256

What’s the Hash-Mode listed for Cisco-ASA MD5?

2410

What hashing algorithm is used in Cisco-IOS if it starts with $9$?

scrypt

Use hashcat to crack the hash, $2a$06$7yoU3Ng8dHTXphAg913cyO6Bjs3K5lBnwq5FJyA6d01pMSrddr1ZG, saved in ~/Hashing-Basics/Task-6/hash1.txt.

85208520

Use hashcat to crack the SHA2-256 hash, 9eb7ee7f551d2f0ac684981bd1f1e2fa4a37590199636753efe614d4db30e8e1, saved in saved in ~/Hashing-Basics/Task-6/hash2.txt.

halloween

Use hashcat to crack the hash, $6$GQXVvW4EuM$ehD6jWiMsfNorxy5SINsgdlxmAEl3.yif0/c3NqzGLa0P.S7KRDYjycw5bnYkF5ZtB8wQy8KnskuWQS3Yr1wQ0, saved in ~/Hashing-Basics/Task-6/hash3.txt.

spaceman

Crack the hash, b6b0d451bbf6fed658659a9e7e5598fe, saved in ~/Hashing-Basics/Task-6/hash4.txt.

funforyou

What is SHA256 hash of libgcrypt-1.11.0.tar.bz2 found in ~/Hashing-Basics/Task-7?

09120c9867ce7f2081d6aaa1775386b98c2f2f246135761aae47d81f58685b9c

What’s the hashcat mode number for HMAC-SHA512 (key = $pass)?

1750

Use base64 to decode RU5jb2RlREVjb2RlCg==, saved as decode-this.txt in ~/Hashing-Basics/Task-8. What is the original word?

ENcodeDEcode

Video Walkthrough

About the Author

Mastermind Study Notes is a group of talented authors and writers who are experienced and well-versed across different fields. The group is led by, Motasem Hamdan, who is a Cybersecurity content creator and YouTuber.

View Articles