steganography
DESCRIPTION
presentation on stegnographyTRANSCRIPT
![Page 1: steganography](https://reader035.vdocuments.mx/reader035/viewer/2022062510/54543607b1af9ff3308b4824/html5/thumbnails/1.jpg)
04/08/23 1
Encryption, Cryptography, and Steganography:
An introduction to coded communications
![Page 2: steganography](https://reader035.vdocuments.mx/reader035/viewer/2022062510/54543607b1af9ff3308b4824/html5/thumbnails/2.jpg)
04/08/23 2
Agenda
• Introduction to Encryption• Cryptography• Steganography• Surveillance• Summary
![Page 3: steganography](https://reader035.vdocuments.mx/reader035/viewer/2022062510/54543607b1af9ff3308b4824/html5/thumbnails/3.jpg)
04/08/23 3
Encryption
• The translation of information into a secret code
• Typically utilizes secret keys or passwords
• Security that is exercised heavily in E-Commerce transactions and authentication
![Page 4: steganography](https://reader035.vdocuments.mx/reader035/viewer/2022062510/54543607b1af9ff3308b4824/html5/thumbnails/4.jpg)
04/08/23 4
Cryptography
• The science of information security
• Includes analog methods: ex. microdots, merging words with images
• Scrambling plaintext into ciphertext
![Page 5: steganography](https://reader035.vdocuments.mx/reader035/viewer/2022062510/54543607b1af9ff3308b4824/html5/thumbnails/5.jpg)
04/08/23 5
Example of microdots...
From this
.
To this...
Example magnified 300X
![Page 6: steganography](https://reader035.vdocuments.mx/reader035/viewer/2022062510/54543607b1af9ff3308b4824/html5/thumbnails/6.jpg)
04/08/23 6
Cryptography
Plaintext encryption---------> ciphertext
decryption--------->
Plaintext
![Page 7: steganography](https://reader035.vdocuments.mx/reader035/viewer/2022062510/54543607b1af9ff3308b4824/html5/thumbnails/7.jpg)
04/08/23 7
Types of Cryptography
• Hash Functions: no key, “digital fingerprint” of a larger document
• Secret Key Cryptography (symmetric encryption): one key
• Public Key Cryptography: two keys - public & private
![Page 8: steganography](https://reader035.vdocuments.mx/reader035/viewer/2022062510/54543607b1af9ff3308b4824/html5/thumbnails/8.jpg)
04/08/23 8
Use of Cryptography
• Security for corporate and government information.
• Privacy• Digital signatures
and authentication
• Currently no restrictions on use in the United States
• Possible criminal use: impede investigation
• Rumored to be used in recent terrorist attacks
![Page 9: steganography](https://reader035.vdocuments.mx/reader035/viewer/2022062510/54543607b1af9ff3308b4824/html5/thumbnails/9.jpg)
04/08/23 9
Steganography
• Steganography is the art of hiding a secret message inside another message.
• Digital watermarking and fingerprinting of audio and video.
• Not intended to replace cryptography, but supplement it.
![Page 10: steganography](https://reader035.vdocuments.mx/reader035/viewer/2022062510/54543607b1af9ff3308b4824/html5/thumbnails/10.jpg)
04/08/23 10
Steganography: an example...
• Computer files
contain unused
or insignificant
areas of data
• Hard to detect
• Special
software to
read
![Page 11: steganography](https://reader035.vdocuments.mx/reader035/viewer/2022062510/54543607b1af9ff3308b4824/html5/thumbnails/11.jpg)
04/08/23 11
Steganography: Other Examples
![Page 12: steganography](https://reader035.vdocuments.mx/reader035/viewer/2022062510/54543607b1af9ff3308b4824/html5/thumbnails/12.jpg)
04/08/23 12
FBI Methods of Policing Encryption
Carnivore (DCS1000)
“Magic Lantern”
![Page 13: steganography](https://reader035.vdocuments.mx/reader035/viewer/2022062510/54543607b1af9ff3308b4824/html5/thumbnails/13.jpg)
04/08/23 13
Carnivore
• File “sniffer”• Detects IP
Packets• Imperfect
against many encryption methods
• Controversial
![Page 14: steganography](https://reader035.vdocuments.mx/reader035/viewer/2022062510/54543607b1af9ff3308b4824/html5/thumbnails/14.jpg)
04/08/23 14
“Magic Lantern”
• Based on Carnivore• Trojan Horse program• Installs on a suspect’s machine
and obtains encryption keys
• Reads keystrokes• Ethics and implementation
debated
![Page 15: steganography](https://reader035.vdocuments.mx/reader035/viewer/2022062510/54543607b1af9ff3308b4824/html5/thumbnails/15.jpg)
04/08/23 15
Conclusion
• Encryption currently has many
legitimate and necessary uses
• Government has become more
concerned about its applications
• Future…?
![Page 16: steganography](https://reader035.vdocuments.mx/reader035/viewer/2022062510/54543607b1af9ff3308b4824/html5/thumbnails/16.jpg)
04/08/23 16
Questions & Answers
This presentation is also on the Web at:
Turbokinetic.com/files.html