Professional Documents
Culture Documents
Steganography
1
Steganography is the practice of hiding information within another message or object to
avoid detection. It can be used to hide any type of digital content, including Text, Images,
Videos, Audio, and Network traffic.
The hidden data is then extracted at its destination. Steganography can be used along with
cryptography as an extra-secure method to protect data.
Some types of steganography include:
Text steganography: Conceals a secret message inside a piece of text
Image steganography: Encodes secret information within a digital image
Audio steganography: Hides a secret message into the audio
Video steganography: Secretly embeds data or other files within a video file
2
Encryption is the process of converting normal data into ciphertext to protect it, while decryption
is the process of converting the ciphertext back into its original plaintext form. Together, they
form the basis of secure communication and data protection in cryptography.
The size of cipher text is the same or The size of cipher text is the same or
smaller than the original plain text. larger than the original plain text.
Security is less as only one key is used It is more secure as two keys are used
for both encryption and decryption here- one for encryption and the other
purpose. for decryption.
3
Symmetric Key Encryption Asymmetric Key Encryption
Symmetric key cryptography and asymmetric key cryptography are both encryption
schemes. Symmetric key cryptography uses a single key for both encryption and
decryption. Asymmetric key cryptography uses a public-private key pair, where one key
encrypts and the other decrypts.
Symmetric key cryptography is more efficient and faster than asymmetric key
cryptography. It's often used for encrypting large amounts of data, such as in databases. It's
also been used in the past for secret communication between governments and militaries.
4
Advantages and Disadvantages of Symmetric
Encryption in Cryptography
Pros Cons
Fast Symmetric encryption is fast & Key must be kept secret The key must be
efficient for large amounts of data. kept secret, which can be challenging when
encryption and decryption take place in
different locations
Secure symmetric encryption is essentially The receiver must get the key, the receiver
unbreakable. must get the secret key from the sender.
Low resource usage symmetric encryption Can’t create digital signature it is not
requires low computer resources. possible to create digital signatures that
cannot be revoked.
Symmetric encryption uses the same key to encrypt and decrypt data. The key is a secret
value that both the sender and the receiver must know and keep safe.
5
Advantages and Disadvantages of Asymmetric
Encryption in Cryptography
Advantages Disadvantages
Secure key exchange: parties can use each Slower than the symmetric encryption.
other’s public keys to encrypt & share their
symmetric keys.
No need to exchange keys: Eliminates the More Complex: not the best solution for
need to exchange secret keys. bulk encryption.
Increased security: Private keys don’t need More-resource-intensive: requires lager key
to be transmitted or revealed to anyone. sizes.
The Data Encryption Standard (DES) is a symmetric-key algorithm that encrypts data. It was
developed by IBM in the 1970s and accepted by the National Institute of Standards and
Technology (NSIT).
6
DES was once the go-to algorithm for encrypting electronic data, but it has been superseded
by the more secure Advanced Encryption Standard (AES) algorithm.
RSA ( )
The RSA algorithm is a public-key encryption technique that uses two keys: one public and
one private. The algorithm was developed by Ron Rivest, Adi Shamir, and Leonard
Adleman. Their paper was published in 1977.
7
In cryptography, hybrid encryption is a method that combines the efficiency of
symmetric-key encryption with the convenience of public-key encryption. Hybrid
encryption is used to encrypt large amounts of data to a public key.
Electronic Signature
A digital signature in cryptography is a cryptographic output that verifies the
authenticity of data. It's a value calculated from data and a secret key that only the
signer knows.
Digital signatures have the following properties:
Unforgeable
Authentic
Can't be modified once sent
Not reusable
Prevent repudiation
Digital signatures are important in businesses because they can help ensure that the
message belongs to the sender. However, they are not foolproof. They can be
compromised if the signer's private key is stolen or the certificate authority that
issued the digital certificate is untrustworthy.
Electronic signatures can take different forms, including:
Typing your name
Drawing your signature with a mouse or stylus
Scanning your handwritten signature
The three types of electronic signatures are:
Simple e-signatures (SESs)
Advanced e-signatures (AdESs)
Qualified e-signatures (QESs)
8
Comparison between Electronic Signature and Digital
Signature
In cryptography, an electronic signature is a broad term for any electronic process that
indicates acceptance of a record or agreement. A digital signature is a more secure electronic
signature that is generated using a digital certificate.
Here's some more information about electronic signatures and digital signatures:
Electronic signatures
Also known as e-signatures, these are the digital version of paper-based signatures. They
are used to sign electronic documents, such as contracts. Electronic signatures are
simpler and more accessible than digital signatures. However, they are less secure and
more vulnerable to tampering.
Digital signatures
These are encrypted, electronic stamps of authentication on digital information. They are
used to protect documents and secure them with encryption standards. Digital signatures
are more secure than electronic signatures and provide a higher level of assurance that
the signature is genuine.