cryptographyvsstegnography
TRANSCRIPT
![Page 1: CryptographyVsStegnoGraphy](https://reader036.vdocuments.us/reader036/viewer/2022081602/555cab1bd8b42aad358b4d09/html5/thumbnails/1.jpg)
![Page 2: CryptographyVsStegnoGraphy](https://reader036.vdocuments.us/reader036/viewer/2022081602/555cab1bd8b42aad358b4d09/html5/thumbnails/2.jpg)
What is meant by cryptography ? • Its Greek word
• Crypto means “ Secret”
• Graphie means “ Writing “
Why Cryptography ? • To convert the plain text to unreadable text
What is need of Cryptography ?
To secure the Sensitive Information
• Username – Password
• Credit Card Number etc..
![Page 3: CryptographyVsStegnoGraphy](https://reader036.vdocuments.us/reader036/viewer/2022081602/555cab1bd8b42aad358b4d09/html5/thumbnails/3.jpg)
CRYPTOGRAPHY COMPONENT
![Page 4: CryptographyVsStegnoGraphy](https://reader036.vdocuments.us/reader036/viewer/2022081602/555cab1bd8b42aad358b4d09/html5/thumbnails/4.jpg)
Cryptanalysisbasic component of cryptography is a cryptosystem
Cryptanalyst • Person working for unauthorized interceptor
Cryptographer
• Person working for legitimate sender or receiver
Cryptology
• encryption and decryption
![Page 5: CryptographyVsStegnoGraphy](https://reader036.vdocuments.us/reader036/viewer/2022081602/555cab1bd8b42aad358b4d09/html5/thumbnails/5.jpg)
Cryptosystem A cryptosystem is a 5-tuple ( , D , M , K , C)
• M is the collection of plaintexts
• K is the set of keys
• C is the set of cipher texts
o = K → C is the set of encipher (encryption)o D = C K → M is the set of deciphering (decryption)
How it works ?
Note • Plaintext M : collection of original messages
• Cipher text C : set of messages in encrypted form
![Page 6: CryptographyVsStegnoGraphy](https://reader036.vdocuments.us/reader036/viewer/2022081602/555cab1bd8b42aad358b4d09/html5/thumbnails/6.jpg)
Cryptosystem
Encryption Decryption
• Process of encoding (enciphering / encryption ) a message
• Process of decoding (deciphering or decryption) an encrypted message to its original form.
securesender
securereceiver
channel data, control messages
data data
Alisa Kishan
Trudy
![Page 7: CryptographyVsStegnoGraphy](https://reader036.vdocuments.us/reader036/viewer/2022081602/555cab1bd8b42aad358b4d09/html5/thumbnails/7.jpg)
CRYPTOGRAPHY
CRYPTOGRAPHY
SYMMETRIC-KEY
CRYPTOGRAPHY
ASYMMETRIC-KEY
CRYPTOGRAPHY
![Page 8: CryptographyVsStegnoGraphy](https://reader036.vdocuments.us/reader036/viewer/2022081602/555cab1bd8b42aad358b4d09/html5/thumbnails/8.jpg)
Types of Cryptosystems Symmetric Key Cryptosystems
• Also called single-key cryptosystems
• M = D ( K , E ( K , M ) )
• The encryption key and decryption key are the same
![Page 9: CryptographyVsStegnoGraphy](https://reader036.vdocuments.us/reader036/viewer/2022081602/555cab1bd8b42aad358b4d09/html5/thumbnails/9.jpg)
Symmetric Cryptosystems Basic techniques for classical ciphers (Encryption)
Substitution
Transposition
Mono-alphabetic
Poly-alphabetic
Stream
• One letter is exchanged for another
• The order of the letters is rearranged Classical ciphers
• Letters of the plaintext alphabet are mapped into other unique letters
• Letters of the plaintext alphabet are mapped into letters of the cipher text space depending on their positions in the text
• Key stream is generated and used to encrypt the plaintext (Symmetric Key Algorithms)
![Page 10: CryptographyVsStegnoGraphy](https://reader036.vdocuments.us/reader036/viewer/2022081602/555cab1bd8b42aad358b4d09/html5/thumbnails/10.jpg)
Transposition
Example :-
T 5 T RH 3 H C E EE 1 I E T GK 4 S S M AE 2 I A E SY 6 S S
TRHCEEIETGSSMAIAEASSCipher-Text :-
Refer (by key): IETGIAESHCEESSMATRSS
Columnar
• IEEIRSHSMESCSTATGSEA
T H E K E Y5 3 1 4 2 6
T H I S I SA S E C R ET M E S S AG E
![Page 11: CryptographyVsStegnoGraphy](https://reader036.vdocuments.us/reader036/viewer/2022081602/555cab1bd8b42aad358b4d09/html5/thumbnails/11.jpg)
Types of Cryptosystems Asymmetric cryptosystem
• M = D (Kd , E (Ke , M ) )
• The encryption key and decryption key are not the same• Kd ≠ Ke
![Page 12: CryptographyVsStegnoGraphy](https://reader036.vdocuments.us/reader036/viewer/2022081602/555cab1bd8b42aad358b4d09/html5/thumbnails/12.jpg)
Asymmetric Key Cryptosystem (Public Key Cryptosystem)
Uses public and private keys
• Public key for encryption• Private key for decryption
Examples
• RSA
• Trapdoor one-way function
• Elliptical curve cryptography
![Page 13: CryptographyVsStegnoGraphy](https://reader036.vdocuments.us/reader036/viewer/2022081602/555cab1bd8b42aad358b4d09/html5/thumbnails/13.jpg)
RSA Principle Developed by Ron Rivets , Adi Shamir, and Leonard Adleman. (MIT, 1977)
C = me mod (pq)
• P , q : any two large prime numbers (more than 512 bits)
• e: public key
• d: private key
• Knowing C and e, it is “infeasible” to calculate m without knowing d , p and q
• Knowing d, p and q, it is easy to find the original plaintext message m = Cd mod (pq)
![Page 14: CryptographyVsStegnoGraphy](https://reader036.vdocuments.us/reader036/viewer/2022081602/555cab1bd8b42aad358b4d09/html5/thumbnails/14.jpg)
RSA Principle
{m, e, p, q; C= me mod(pq)}
{C, e, p, q; m=Cd mod(pq)}
Sender
Intruder
Receiver
{C, e}
![Page 15: CryptographyVsStegnoGraphy](https://reader036.vdocuments.us/reader036/viewer/2022081602/555cab1bd8b42aad358b4d09/html5/thumbnails/15.jpg)
![Page 16: CryptographyVsStegnoGraphy](https://reader036.vdocuments.us/reader036/viewer/2022081602/555cab1bd8b42aad358b4d09/html5/thumbnails/16.jpg)
What is Steganography?What is Steganography?
• STEGANOS – “Covered”• GRAPHIE – “Writing”
Its Greek Words:
Steganography is about Hiding messages Digital Applications of Steganography
• Can be hidden in digital data - MS Word (doc)
- Web pages (html) - Sound files (mp3, wav, cda)- Video files (mpeg, avi)
- Digital images (bmp, gif, jpg) Today, steganography is used primarily
to protect digital rights
• “watermarking” copyright notices
• “fingerprinting” a serial ID
![Page 17: CryptographyVsStegnoGraphy](https://reader036.vdocuments.us/reader036/viewer/2022081602/555cab1bd8b42aad358b4d09/html5/thumbnails/17.jpg)
History of History of SteganographySteganography Chinese silk balls
Invisible ink-jet technology
Microdots Easter eggs
Hiding a message within a text Shift some words by one point/pixel
- Shifted words (or their first letters) make the sentence Use different fonts
- Letter by letter or word by word
![Page 18: CryptographyVsStegnoGraphy](https://reader036.vdocuments.us/reader036/viewer/2022081602/555cab1bd8b42aad358b4d09/html5/thumbnails/18.jpg)
A Real ExampleA Real Example During WW2 the following cipher
message was actually sent by a German spy “Apparently, neutral’s protest is
thoroughly discounted and ignored. Isman hard hit. Blockade issue affect pretext for embargo on by products, ejecting suets and vegetable oils.”
Hidden Message
• “ Pershing sails from NY June 1”
![Page 19: CryptographyVsStegnoGraphy](https://reader036.vdocuments.us/reader036/viewer/2022081602/555cab1bd8b42aad358b4d09/html5/thumbnails/19.jpg)
ModernModern Steganography Steganography
Hiding one message within another (“container”)
Most containers are rich media
• Images , audio, video ,mp3 etc.
Copyright notices embedded in digital art
• Prove ownership
Digital cameras EXIF tags
• Not secretive, but hidden from the eyez• Embed info such as camera type, date, shutter
speed , focal length,..
Similarly , possible to embed messages in invisible parts of html pages
![Page 20: CryptographyVsStegnoGraphy](https://reader036.vdocuments.us/reader036/viewer/2022081602/555cab1bd8b42aad358b4d09/html5/thumbnails/20.jpg)
Steganography Steganography SystemSystem
![Page 21: CryptographyVsStegnoGraphy](https://reader036.vdocuments.us/reader036/viewer/2022081602/555cab1bd8b42aad358b4d09/html5/thumbnails/21.jpg)
ComparisonComparisonCryptography
C = Ek (P) Plain text
P = Dk (C)
Key
Steganography
secret message
cover image
f Stego message
f Ciphertext
![Page 22: CryptographyVsStegnoGraphy](https://reader036.vdocuments.us/reader036/viewer/2022081602/555cab1bd8b42aad358b4d09/html5/thumbnails/22.jpg)
Hiding a Message in an ImageHiding a Message in an ImageOriginal Picture Embedded picture
![Page 23: CryptographyVsStegnoGraphy](https://reader036.vdocuments.us/reader036/viewer/2022081602/555cab1bd8b42aad358b4d09/html5/thumbnails/23.jpg)
![Page 24: CryptographyVsStegnoGraphy](https://reader036.vdocuments.us/reader036/viewer/2022081602/555cab1bd8b42aad358b4d09/html5/thumbnails/24.jpg)