A Deeper Dive into Cryptography and Steganography

What is Cryptography?

Cryptography is the technique of securing information and its communication through the use of algorithms and protocols so as to ensure that only the intended end receivers are able to understand and process it. The prefix “crypt” means hidden and the suffix “graphy” means writing.

Cryptography is most commonly associated with scrambling plaintext (ordinary text, like email text) into ciphertext using encryption, then using decryption, conversion of the ciphertext back into its original form. It also includes the obfuscation of information in images using techniques such as microdots or merging words with images to hide information from prying eyes.

Cryptography in Cyber Security

Cryptography offers confidentiality, ensuring information will only be accessed by the person for whom it is intended for. Moreover, it provides data integrity, meaning that the data cannot be modified in storage or while travelling in communication between sender and receiver. Non-repudiation is yet another feature, wherein the sender cannot deny their intention to send information at a later stage. Authentication is also offered, the identities of the sender and receiver while participating in communication is confirmed, along with the origin and destination of the data.

In an increasingly software-transformed world, it is necessary for business organisations and governments, even for personal networks/communications or LAN networks indulging in sensitive information communication, to create a secure system for intercommunication. A cryptosystem that helps such networks define cryptography protocols and algorithms (or ciphers), along with the management of cryptographic keys, can be used to create a secure system by working at the data level, securing the data in transit and at rest, protecting sensitive information leaks from malicious hackers. It can also help authenticate senders and recipients.

Types of Cryptography

Broadly, there are three types of cryptography:

1. Symmetric-key Cryptography: A single key is shared between the sending and receiving party. Sender uses the key to create cipher text using the shared key and transmits it over the network, and at destination, it is converted back by receiver using the same key.

2. Asymmetric-key (Public-key) Cryptography: Here, for each receiver two keys are defined, public and private. When information needs to be sent to the receiver, the sender makes use of the public key (that can be freely distributed) to encrypt the data, and this encrypted data can only be decrypted by the private key that is kept secret at all times by the receiver.

3. Hash Functions: No keys are used in this type of cryptography. A fixed-length hash value is computed as per the plain text that makes it impossible for the contents of the plain text to be recovered.

Cryptography and its importance

Cryptography ensures cyber security at the data level; hence it is an essential component to be included in IT systems. Cyber security enthusiasts must look deeper into cryptography and its algorithms, and can even choose to pursue being cryptographers, specialised individuals in cryptography. With large-scale breaches happening all around the world, it is important to research newer standards and algorithms for better security.

What is Steganography?

Having discussed cryptography, another technique relating to data security is also quite prominent, called Steganography. Steganography is a technique to conceal or hide secret data within a normal, ordinary file or message to avoid its detection. This secret data is then extracted from the file at the destination. This type of a technique can be used to hide any form of digital content, like text, audio, image, etc. into another digital content.

How does Steganography work?

The basic steganography model is pretty simple. A cover file is selected for the secret message to be sent. A steganographic encoder merges these two files, creating a stego object, which is used to transmit over the communication channel (no one other than the sender and intended recipient suspects that a message has been hidden in the cover file). This stego object, along with the key (that is possessed both by encoder and decoder) are passed in the steganographic decoder, to retrieve the secret message. There are several algorithms to make the encoding-decoding happen, each classified by which type of cover file is used.

Use of Steganography

Steganography is used whenever a need arises to convey a secret message. In cyber security, this is an especially useful technique to transmit sensitive information. While this technique is used for legitimate uses, malware developers also make use of this technique to transmit potentially harmful malicious code masquerading as unharmful code or software, which can result in a serious breach. Therefore, it is essential for cyber security professionals to be aware of stenography, so that the correct measures can be taken to prevent a potential attack from such techniques.

Steganography along with cryptography can equip a communication network with the utmost data security possible. If the stego object is further encrypted, the data will be safe from detection as well. When using only encryption, the data is clearly marked to have pertinent information, but complementing this with steganography can really make the difference.

Join our discord server for more info! :

Want to know more?

BugBase is India’s largest cybersecurity marketplace! We provide bug bounty programs that can be reached out to by ethical hackers and develop a security enthusiasts community all over the country. We are expanding our services to provide security audits and VAPT.

Our website: https://bugbase.in/




India’s first consolidated Bug Bounty Platform’s technical blog by Aditya Arun Iyer

Love podcasts or audiobooks? Learn on the go with our new app.

Internet influnce user’s behavior.

Fabric CA — Generating crypto material in Production environments

Major U.S. Gas Pipeline Shuts Down Thanks to Another Ransomware Attack

NFT, Crypto Currency And Virtual World : MetaVerse

Fusotao Tutorial — How to Create a Polkadot Wallet?

What is the Web3 Domain Buzz About?

Ransomware as a Service


Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
BugBase - The BugGyaan Blog

BugBase - The BugGyaan Blog

India’s first consolidated Bug Bounty Platform’s technical blog by Aditya Arun Iyer

More from Medium

Introduce to Mobile Security Training Module 1

(Letsdefend.io) Case: SOC169 — Possible IDOR Attack Detected

Shifting left with vulnerability management

What I Learned This Week in Cyber 5/15/22– 5/21/22