CIP Cyber

Steganography VS Cryptography

Table of Contents

Cryptography is the most common method to protect important information, cryptography techniques are very useful to protect and secure the perimeter.


Steganography is an art of hidden
communication and in this article we will discuss about steganography
with the background and we will have a deepest look. Secret
communication is not a new term and human have being using this term
from ages infect animals has their own way of communication. 

Secret
communication is very important because if your message is important
and if you do not want others know about your message than you use
different techniques to hide your message from third person, there
are many ways to do this. In computing and in computer science we use
a term called cryptography, in short cryptography is the science of
secret communication. There are so many algorithms are available to
make the cryptography process strong so that an intruder or cracker
does not able to crack it. Cryptography has been implemented on
different services even you are using one algorithm on your smart
card (it may be your credit card, SIM card and others), the famous
cryptography algorithm is DES (data encryption standard) and we have
different variant of DES like triple DES to make the process and the
secret key strong and unbreakable. So if we have a strong and smart
system for secret communication than:


  • Why there is a need to introduce a
    new technique?
  • What is Steganography?
  • How steganography is smart and
    strong than cryptography?
  • What is the working mechanism of
    steganography?
These are the most important question
that you might be thinking about steganography and I will discuss
each and everything about steganography in detail.


Why There Is a
Need to Introduce a New Technique?



If
cryptography is a strong way to encrypt and secure a communication
than why we need a new technique? Answer is very simple when we are
using any cryptography technique we need to send a secret key and
third person can easily judge that some secret communication is going
on. Lets consider an example simple communication, we need two
entities one is the sender and the other is receiver sender send the
message and receiver receive it, a simple communication but consider
an encrypt way of communication. Entities like this:


  • A
    sender
  • A
    receiver
  • A
    third person (might be machine and other way)


Sender
encrypt the message by using a pre-define algorithm and generate a
secret key and a cipher message than send it to receiver, receiver
needs a key to decrypt it generally a third system carry this key and
provide it to the receiver than receiver decrypt it. So in this case
anyone can understand that something unusual is going on. In some
cases like an military agent (secret agent) wants to send some
message to the command station but he/she does not want to do this
cryptanalysis because enemies can easily judge the process than the
simple way to send a normal message and hide your secret message into
this normal message.


What is
Steganography?


Steganography
has been discovered from a Greek term and it means “Covered
writing”, Cryptography has also discovered from a Greek term and it
means “Secret writing”. So you can easily understand that both
techniques has been discovered from Greek and both are the methods of
secret communication. In steganography you don’t need any key or a
key distributor (pure steganography). The basic idea of steganography
is to covered writing means hide your secret message into a
simple/regular message so that other parties does not aware about the
communication. 
These are the most important question
that you might be thinking about steganography and I will discuss
each and everything about steganography in detail.






Why There Is a
Need to Introduce a New Technique?







If
cryptography is a strong way to encrypt and secure a communication
than why we need a new technique? Answer is very simple when we are
using any cryptography technique we need to send a secret key and
third person can easily judge that some secret communication is going
on. Lets consider an example simple communication, we need two
entities one is the sender and the other is receiver sender send the
message and receiver receive it, a simple communication but consider
an encrypt way of communication. Entities like this:







  • A
    sender
  • A
    receiver
  • A
    third person (might be machine and other way)







Sender
encrypt the message by using a pre-define algorithm and generate a
secret key and a cipher message than send it to receiver, receiver
needs a key to decrypt it generally a third system carry this key and
provide it to the receiver than receiver decrypt it. So in this case
anyone can understand that something unusual is going on. In some
cases like an military agent (secret agent) wants to send some
message to the command station but he/she does not want to do this
cryptanalysis because enemies can easily judge the process than the
simple way to send a normal message and hide your secret message into
this normal message.







What is
Steganography?







Steganography
has been discovered from a Greek term and it means “Covered
writing”, Cryptography has also discovered from a Greek term and it
means “Secret writing”. So you can easily understand that both
techniques has been discovered from Greek and both are the methods of
secret communication. In steganography you don’t need any key or a
key distributor (pure steganography). The basic idea of steganography
is to covered writing means hide your secret message into a
simple/regular message so that other parties does not aware about the
communication.

  

The next article of this series will be publish soon!


Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
CIP Cyber Staff

CIP Cyber Staff

CIP Cyber Staff comprises CIP cybersecurity experts committed to delivering comprehensive information on critical infrastructure protection. The content covers diverse topics, equipping professionals to defend organizations and communities in an ever-evolving cyber landscape.

Most popular

Industrial Cybersecurity

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings

Related Articles

What Proxies Are For

When you cannot access certain sites or hide your identity, you need a tool for that. For example, the USA proxies are in demand among

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings