Notes from CPNT-250 course at SAIT.

Cryptography: provides us with both the mechanism and confidence to

store and transmit our most sensitive digital information.

Symetric Key Cryptography

When same key is used for both encryption and decryption. Also referred to as private key cryptography.

Asymmetric/Public Key Cryptography

User different keys for encryption and decryption. Each user generates a pair of keys. A private key is used to decrypt and a public key is used to encrypt.

$ echo 'secret' > secret.txt
$ gpg -c secret.txt
$ gpg -d secret.txt

Stenography

Hiding a secret message within an ordinary message and the extraction of that message at its destination. The goal is not to hide the content of a message, but to hide the existence of a message.

There are two files composing the finished stego file or stego object.

The file that contains the secret message is called the carrier file or cover object. The embedded secret document or message is sometimes called the payload.

$ echo secret > secret.txt
$ cat secret.txt >> image.png
$ tail -c 7 image.png
secret

The Deep Web

Large portion of data available on the web is present in the so called deep web (or hidden web);

Tor is a free tool that allows people to use the internet anonymously. Tor anonymizes the origin of the internet traffic. Install the Tor browser and/or download TAILS tails.boum.org.

comments powered by Disqus