Professional Documents
Culture Documents
Unit 4
Unit 4
What is cryptography?
Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables
you to store sensitive information or transmit it across insecure networks (like the Internet) so that it
cannot be read by anyone except the intended recipient. While cryptography is the science of securing
data, cryptanalysis is the science of analyzing and breaking secure communication. Classical
cryptanalysis involves an interesting combination of analytical reasoning, application of mathematical
tools, pattern finding, patience, determination, and luck. Cryptanalysts are also called attackers.
Types Of Cryptography:
In general there are three types Of cryptography:
1. Symmetric Key Cryptography: (secret key)
It is an encryption system where the sender and receiver of message use a single common key to encrypt and
decrypt messages. Symmetric Key Systems are faster and simpler but the problem is that sender and receiver
have to somehow exchange key in a secure manner. The most popular symmetric key cryptography system is
Data Encryption System(DES).
2. Hash Functions:
There is no usage of any key in this algorithm. A hash value with fixed length is calculated as per the plain
text which makes it impossible for contents of plain text to be recovered. Many operating systems use hash
functions to encrypt passwords.
3. Asymmetric Key Cryptography (public key)
Under this system a pair of keys is used to encrypt and decrypt information. A public key is used for
encryption and a private key is used for decryption. Public key and Private Key are different. Even if the
public key is known by everyone the intended receiver can only decode it because he alone knows the private
key.
Steganography is a means of concealing secret information within (or even on top of) an
otherwise mundane, non-secret document or other media to avoid detection. It comes from the
Greek words steganos, which means “covered” or “hidden,” and graph, which means “to write.”
Hence, “hidden writing.”
Steganography Techniques
Depending on the nature of the cover object(actual object in which secret data is
embedded), steganography can be divided into five types:
1. Text Steganography
2. Image Steganography
3. Video Steganography
4. Audio Steganography
5. Network Steganography
File Manipulation
File organization and manipulation is an essential skill for using a computer. We have
summarized below some of the basic operations that are used to perform these tasks.
Keep in mind that there are many ways to perform these operations, and we have
suggested one possible approach that is reasonably consistent among various versions
of the Windows operating system. If you know another approach from your previous
computer work, use that approach.
1. Data hiding in the NTFS file system
1. Software and its engineering
1. Software organization and properties
1. Contextual software domains
1. Operating systems
1. File systems management