Cryptography and Techniques for Hiding Information

March 14, 2018 | Views: 4835

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

 

In computer science, cryptography is a method of hiding information in storage and during a communication so that only authorized person can access to that information.  Cryptography contains lot of cryptology method for securing communication and information like hiding text or messages behind images, Asymmetric encryption (public key cryptography) for securing Networks. In this article, we are going to discuss some common and popular cryptography tool and techniques.

 

1.     Steganography

 

 

 

Steganography is a method of hiding information, message or files behind an image especially from the people who could snoop on our messages. A picture file contain some unused space in it and that space can be used for storing message or some information in it. The good part is, a snooper would have no idea that the picture has some hidden information in it.

 

Recommend tool: You can use LSB-Steganography for hiding file into image which is an open source software program for steganography.

 

2.      Rot13

 

 

 

Rot13 or Rotated by 13 is a simple cryptography system where the first letter of a word get replace with the 13 letter down the alphabet as there are 26 letters alphabets so the algorithm that encode the message also decode it. We can also use Rot12, Rot14 and lot of other Rot cipher. 

 

Recommend tool: There are lots of site which provide Rot13 encode and decode service which you can use I would recommend to use Rot13.com to use. 

 

3.      Secure Shell

 

 

 

Secure shell provide a secure communication by securing a network. It is a cryptographic network protocol so that you can secure your communication over an unsecure connection. Most common use of this protocol is in remote login services where connection is encrypted with secure shell so that no third party can snoop on the password in that network. Secure shell also used for secure file transfer which Secure File Transfer Protocol (SFTP). SFTP is subsystem of secure shell for handling file transfer, some advantage of SFTP is it encrypt username as well as password and the file which is being transferred over that network.

 

Recommend Tool: There are lot of application of secure shell but I will provide IronSFTP which is an open source program for Secure end-to-end encrypted file sharing over secure shell.

 

 

 

 

 

Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Ready to share your knowledge and expertise?
9 Comments
  1. Superb man…. This information was great

  2. Thanks for sharing wonderful information of ROT13

  3. Thank you for the information on ROT13!

Page 2 of 2«12
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel