Information security

Information hiding is a process of embedding it in a digital media, and retrieving it back. The major requirements of the process are to be imperceptible, robust, and secure.

The major criteria for data hiding are: The most important, and the most misunderstood topic of this course is the security. It is formed by:

Information hiding methods are different, on basis of the

And upon the type of threat (attacks) which are malicious (intentional) and non-malicious (not intentional)

What to hide

The things we are supposed to hide are:

Why do we hide?

The areas of the course

Information Theory

The most important aspect of the security plans is the understanding of the properties and behaviors of the information to be protected. Information has also identity, by which is can be validated, authenticated and addressed. It stays combined with values until and unauthorized change. The information identity combined with vales is called Information Integrity.Piratesation? is the process of evaluating the degree of protection for various items of importance. However practically nothing is fully guarded. In order to be feasible the plan must have a scope. Security plan has three important parts:

Cryptographic method layers

is a second layers of the encryption model. Cryptography disguises informations to be read by attacker, even is wrongly obtained. Its methods are extremely complex and need great deal of time to be analyzed and broken. Cryptography methods are varied, because once the attackers came up with some method of breaking information - this method should be invalidated. Those methods are improving from time to time, and becoming more complex. General cryptography elements are:

Authentication and verification layer

it determines, whether the presented information about the accessor? is real. Authentication techniques usually take advantage of the following FOUR factors.

Cryptographic Principles and Methods

Data to Information

information seats at core of model

Metadata

the data about data is meta data

Information systems

The most important phases of the information system life cycle are:

Information Management

Mathematical Principles of Cryptography

The information must be treated the same, on the binary level. The type of information (whether it is in bits, float, doubles) doesn't have any meaning. The information has binding in order to be encrypted, the binding can be removed only using some cryptographic procedure. All the methods of number theory must be applied to the binding. On today's dates, the encryption, carried on the character level is not capable of generating a code with significant countermeasure.

Symmetrical Key Cryptography

This type of cryptography works by having a cipher (and key) which are the same for encryption and decryption.

Asymmetrical Key Cryptography

This type of cryptography works by usually having 2 keys which one encrypts (public) and the other decrypts (private). Its main use is to secure communications such as email or instant messaging. Also in this scheme it can be used to sign messages and files (such as programs) to verify their authenticity with their corresponding public key.

Bibliography

Information hiding and watermarking Introduction to basic concepts and techniques. by: Nasir Memon, Polytechnic University.

This article is issued from Wikiversity - version of the Saturday, January 19, 2013. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.