Steganography Analysis

Great Essays
What is Cryptography?
When a message is encoded so it becomes unreadable while making sure only the intended receiver is capable of decoding it back into its original form is what we commonly known as Cryptography. It is done by means of an encryption and decryption algorithm (often the same implemented in reverse order) and very often using a secret key. Some of the early cryptographic systems kept the algorithm itself secret and did not use a key (Stallings, 2014).
Only when using a secret key one can convert cipher text back into a more familiar readable form. Another way to achieve this is by using computerized aid devices, which use mathematical formulas to change text from one form to another (Stallings, 2014).
The Basic Elements of a
…show more content…
Steganography is where a plaintext message may be hidden in one of two ways. There are two primary Steganography methods to conceal the existence of the message, plain sight and encoded (Stallings, 2014). A simple but time consuming to build form of Steganography is the arrangement of words or letters within a normally written text that, once rearranged, spells out the real message (Stallings, 2014).
Other techniques used in steganography include marking characters, where carefully selected letters of printed or typewritten text are overwritten in some other fashion such as pencil or ink. These marks are not visible at first sight unless the paper is held at a specific angle into bright light. Other method to achieve this is puncture small holes with a pin on selected letters that will not be visible unless the paper is held up again into bright light at the right angle. Typewriter correction ribbon was also used in between lines resulting with the correction tape being visible only under a strong light (Stallings,
…show more content…
With new threats and plots being developed each day, the need to encrypt and decrypt secure communications is at an all-time high. Here in the United States the National Security Agency uses cryptanalysis to protect the nation from threats both here and overseas. All branches of the United States Armed Forces require secure communications during war and peace. The development of new cryptographic systems is paramount in keeping those forces ready. Cryptography has uses in every part of modern life, it is used in the healthcare sector as well as the financial sector and also protects critical infrastructure such as the national power grid and air traffic control systems. Given that we now live in the age of electronic communication it is safe to assume that the functions and needs for cryptography and cryptanalysis will continue on for the foreseeable

Related Documents

  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    Cyber Ark is an enterprise application cyber security company based in Israel with offices worldwide. The United States headquarters is in Newton, MA. with regional sales offices in Ft. Lauderdale, Houston, Las Angles and Chicago. The company is well known in the IT Security Company with a quality product designed to secure data in the enterprise as well as the cloud.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    In the article “Is a Picture worth a Thousand notes” by Jessica Higgins, she was curious to why most of her students choose other form of note taking rather than the traditional handwriting methods. That lead Higgins students to start a class discussion, one student said “I can’t read my own handwriting”, other students use electronic devices to record notes because they did not want to miss out on class discussion because they were “writing notes”. Most important of all Higgins students told her electronic note taking is far easier, and they don’t need to fear of losing their…

    • 100 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 1 Essay

    • 639 Words
    • 3 Pages

    RQ 1 A function for one block of bits in a hash function is referred to as a compression function. RQ 2 The main arithmetic and logical functions in SHA algorithms include AND, OR, NOT, XOR and the circular shift. RQ 3…

    • 639 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ism 491a Capstone Project

    • 695 Words
    • 3 Pages

    This document provides the progress of my ISM 491a capstone project. This project was to research an encryption method that would strengthen the company’s environment and protect them if there was ever a data breach. As presented in my project proposal, I identified two principal objectives for this project to be successful. The first was to perform an assessment of the environment currently in place, and the second was to come up with an encryption solution that can be implemented in the company‘s environment without disrupting any applications or processes. This update will provide the research that is completed to this point, the area that I am falling behind in, and the strategy to bring the delinquent tasks up to date.…

    • 695 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    On October 13th I attended Professor Ezekiel's class to sit in on a guest speaker. The speaker, Dr. Laurent Njilla is a Research Electronic Engineer at the Air Force Research Laboratory in Rome, NY. Dr. Njilla did not speak much of his professor as he had another objective in mind, speak about cyber security and the opportunities it presents. With only an hour to speak he quickly jumped into his PowerPoint with great enthusiasm for the topic at hand. The title of this summary was the theme of his presentation and this summary will report a few of the things he covered in the time frame he was given to speak.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Public Key Infrastructure is a comprehensive subject that is constantly developing to meet high growing demands of the business word. PKI is one of the most effective way for securing networks. The encrypted information that is sent is delivered using a public key. An individual is able to provide the public key to the sender, or the key can be retrieved from the directory from where it was published. PKI works in concert of other security mechanisms to help protect vital information (Weise, 2001).…

    • 680 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Non-Verbal Communication

    • 724 Words
    • 3 Pages

    By providing relevant training to employees. Using simple and clear words. Jargons should be avoided. Reduce or eliminate any noise level. Listen attentively and as carefully as you can.…

    • 724 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Hidden Figures Analysis

    • 1641 Words
    • 7 Pages

    Lakhvir Singh David King English 150 25 October 2017 Struggle for Granted Equality is a very expensive commodity and is achieved through a lifetime of struggle by generations of men and women. The book Hidden Figures is a story of the group of black women who were able to break the glass barrier of centuries-old racism and segregation at NACA, later called NASA. Margot Lee Shetterly the author of Hidden figures book is trying to show the struggle of the black mathematicians Dorothy Vaughan, Kathrine Johnson, and Mary Jackson at Langley. The struggle of these black women in their work became the inspiration to an upcoming generation of black people. Their struggle would lead to the end of segregation in the United States and allow African American…

    • 1641 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    The Beale Cipher

    • 784 Words
    • 4 Pages

    Finally, B1 is probably real because it doesn't make sense for the author to try and relieve boredom by making complicated letter strings. They would take a very long time to make and he would want to get it over with. He could've actually been doing something called double encipherment. Double encipherment is a process in which the coder encodes a document twice making it even more difficult to crack. The writer could've been experimenting with this technique until he made a letter string of sufficient length.…

    • 784 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    A possible technique would be to use the code word as a position compass for hiding and extracting letters of the message exchanged. The warden is oblivious to the existence of a secret message. The medium mentioned in the problem above could be photographically produced microdots used by espionage agents during World War II, a Bacon cipher that uses different typefaces to hide information or a digitally altered JPEG image hide using Steg hide. In all the above-mentioned methods the priority is to hide messages in plain sight and make the carrier look…

    • 950 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Memory In Inside Out

    • 788 Words
    • 4 Pages

    The first step, encoding is the rendering information into a way in which it can be used. This means that encoding is a way of processing information.…

    • 788 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Four Resource Model

    • 838 Words
    • 4 Pages

    The first part of the Four Resource, code breaking, requires using semiotic systems used within texts to make sense of the “marks on the…

    • 838 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cryptographic primitives are basic algorithms that used to create a protocol in the computer. The algorithm is the basic part of designing a encrypting systems. The security level of a computer system depends on the reliable level of the cryptographic primitives. Here is a detailed graphic on what is included and the types of cryptographic primitives in the CNG. Figure 6.1 CNG cryptographic primitives…

    • 1034 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Introduction First and foremost, writing a good wiki entry requires good writing and editing skills. However, there are many technical skills involved in creating an attractive and readable wiki entry, as well. In addition to text, most wikis will allow you to insert multimedia such as pictures (see Figure 6.3.1 below for an example). You can also add links to your text--both links to other pages inside the wiki, and links to regular web sites. Knowing how to format your changes can also help make the difference between a wiki page that is hard to read, and one that looks professional.…

    • 1704 Words
    • 7 Pages
    Improved Essays
  • Great Essays

    Steganography Essay

    • 1053 Words
    • 4 Pages

    As to other advanced pictures, the most well-known strategies for steganography are slightest significant bit insertion, concealing and filtering, and calculations and changes. (Johnson and Jajodia, "Investigating Steganography: Seeing the Unseen," 27). There are numerous present employments of steganography, in the field of gadgets as well as in different regions. Steganography is utilized when there is the danger that the message would be controlled.…

    • 1053 Words
    • 4 Pages
    Great Essays

Related Topics