Cryptography

Mon
22
Aug

Steganography FAQ

Contributed by Aelphaeis Mangarae

Steganography is the practice of hiding private or sensitive information within something that appears to be nothing out of the usual. Steganography is often confused with cryptology because the two are similar in the way that they both are used to protect important information. The difference between the two is that Steganography involves hiding information so it appears that no information is hidden at all. If a person or persons views the object that the information is hidden inside of he or she will have no idea that there is any hidden information, therefore the person will not attempt to decrypt the information.

This document is in PDF format. To view it click here.

Mon
25
Jul

Cloud Computing and Homomorphic Encryption

Contributed by Vicki Holzknecht

Cloud Computing has recently gained quite a bit of momentum throughout the technology community. The Cloud is intertwined in everyday living via mobility platforms, social networking, email, accessing cloud based applications, the list goes on for miles. Cloud Computing allows for services to be delivered by simply having an Internet connection. When encrypted data is sent to the cloud is it truly secure? How safe is the Cloud? The research within this paper will explain how a form of encryption known as homomorphic can be interlaced into the software for truly encrypting data without it ever being decrypted when stored within the cloud.

This document is in PDF format. To view it click here.

Mon
11
Jan

Distinguishing Attack on FastFlex Stream Cipher

Contributed by M. Orumiehchi

Fastflex is a fast and flexible stream cipher that is designed for hardware and software environments. In this article, we point out that the keystream generated from FastFlex can be distinguished from a truly random stream with probability 1 and a few output streams.

This document is in PDF format. To view it click here.

Mon
28
Dec

An Encrypto-Stego Technique Based Secure Data Transmission System

Contributed by Neha Sharma, Mr. J. S. Bhatia, and Dr. Mrs. Neena Gupta

Digital communication has become an essential part of infrastructure nowadays, a lot of applications are Internet-based and in some cases it is desired that communication be made secret. Consequently, the security of information has become a fundamental issue. Two techniques are available to achieve this goal: Encryption and steganography is one of them. Using cryptography, the data is transformed into some other gibberish form and then the encrypted data is transmitted. In steganography, the data is embedded in an image file and the image file is transmitted.

This document is in PDF format. To view it click here.

Mon
28
Dec

What is the point of encryption if you don’t know who for?

Contributed by Dr. Colin Walter

Phishing is the fastest growing threat in the history of Internet and has gained immense popularity amongst Internet fraudsters and hackers as a simple yet effective way to gain unsolicited access to confidential user information. Using social engineering tactics, fraudsters ensure that the trust relationship established by a company with its customers is exploited to maximum effect. It is for this reason that moving towards stronger identity assurance techniques is the only long term strategy that will maintain the stability of the Internet.

This document is in PDF format. To view it click here

Pages

Subscribe to RSS - Cryptography