Professional Documents
Culture Documents
Disha
Disha
` ` `
Encryption
Plain text Cipher text Plain text
Decryption
Cipher text
` ` `
` ` ` ` ` `
Defending against external/internal hackers Defending against industrial espionage Securing E-commerce Securing bank accounts/electronic transfers Securing intellectual property Avoiding liability
` ` ` ` `
Pervasiveness of email/networks Online storage of sensitive information Insecure technologies (e.g. wireless) Trend towards paperless society Weak legal protection of email privacy
` `
Steganography Cryptography
` `
Steganography covered writing is an art of hiding information Popular contemporary steganographic technologies hide information in image.
` ` `
Private (symmetric, secret) key the same key used for encryption/decryption Problem of key distribution Public (asymmetric) key cryptography a public key used for encryption and private key for decryption Key distribution problem solved
` ` ` ` `
Data secrecy Data integrity Authentication of message originator Electronic certification and digital signature Non-repudiation
` ` `
False sense of security if badly implemented Government regulation of cryptographic technologies/export restrictions Encryption prohibited in some countries