Page 6 of 12 FirstFirst ... 45678 ... LastLast
Results 51 to 60 of 118

Thread: Do You Know ?

  1. #51
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default steganography

    Steganography

    Hiding a message in a text or an image is called steganography. Hidden messages become visible when treated with special chemicals or exposed to Ultra Violet light (used in spy work). UV light is used to detect counterfeit currency. Using photographic technique, a message can be reduced to a 'micro dot' and placed in a text or the micro dot can be hidden on the envelope, under the postal stamp etc.

  2. #52
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default Cryptography

    Cryptography is a science of coding and decoding messages for secrecy. Confident and secret messages are sent from one party to another. An enemy can intercept the messenger and can access the message content. To avoid such an incident, messages are normally coded.

    There is an old story of a king who send a message to his army general in a very special way. The messenger's head was shaved and a message is painted on his head. He was sent to the general with the message on his head after a month time !.

    In public key crypto system, the keys for encryption (coding) and decryption (decoding) are different. e.g. - RSA (Rivest Shamir Adleman) public key system.

  3. #53
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default Cryptography

    Cryptography

    In Transposition crypto system message is coded using transposition of alphabets.

    Message : this is a secret between us

    Encrypted 1 : htsi si a esrcte ebwteen su (2 alphabets are grouped and interchanged it's position)

    Encrypted 2 : htsisiaesrcteebwteensu (2 alphabets are grouped and interchanged it's position. Space is removed fronm the coded word).

    Encrypted 3 : htsi siae srct eebw teen su (2 alphabets are grouped and interchanged it's position. Then it is grouped with 4 alphabets).

    Two or three or four rail system code

    Message : this is a secret between us

    Encrypting using two rail system

    t i i a e r t e w e u
    hs s s c e b t e n s

    Encrypted message : tiiaerteweuhssscebtens or group it as tiiaert eweuhs ssceb tens

  4. #54
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default Substitution ciphers

    Substitution ciphers : Here each letter reains it's position, but is substituted by another letter. A three place shift left forms the cipher in the example below.

    Plain alphabet : a b c d e f g h i j k l m n o p q r s t u v w x y z

    Cipher alphabet : d e f g h i j k l m n o p q r s t u v w x y z a b c

    Message : this is our secret

    Encrypted message : vjku ku qwt ugetgv

    Crypt analyst uses short cut techniques like frequency analysis to decrypt (decipher) a message. The frequency of occurance of English alphabets in a message are as etaonrlshdifcmugpywbvkrjqz.

    So 'e' is the most frequently used alphabet, while 'z' is used less. Code books are used to decode messages. Normally, there will be an understanding between the sender and receiver about the code of the algorithm used in encrypting.

    e.g.- Lion means Head of the organization, off shoot means department.

  5. #55
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default Vignare square

    Vignare square, is an excellent cryptostystem.

    Plain alphabet
    a b c d e f g h i j k l m n o p q r s t u v w x y z

    Cipher alphabet
    b c d e f g h i j k l m n o p q r s t u v w x y z a
    c d e f g h i j k l m n o p q r s t u v w x y z a b
    d e f g h i j k l m n o p q r s t u v w x y z a b c
    -----------------------------------------------------
    u v w x y z a b c d e f g h i j k l m n o p q r s t
    -----------------------------------------------------
    a b c d e f g h i j k l m n o p q r s t u v w x y z

    Ciphering
    Message : i love you (selected for simplicity)

    Keyword : u want win (it should be similar to the message in alphabet count)

    Cipher text : c haix uwh

    Here the message's 'i' is coded using keyword's 'u' with the help of Vignare square. Consider the last line's alpahbet 'i' and the line starting with keyword 'u'. The intercept gives 'c'. Similarly other alphabets are coded.

    Try the above method of coding using another keyword plane plane. Decoding is difficult without knowing the keyword.

  6. #56
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default Data Encryption System

    Data Encryption System

    Based on the IBM techniques the National Bureau of Standards (USA) developed standard cipher system for commercial use named as DES - Data Encryption System. 64/128 bit key encryption make decoding difficult in DES. Still, it can be cracked by today's powerful PCs connected parallelly equipped with special softwares. Bigger the key, stronger is the
    encryption. For most secure transaction, use 512 bit key.

    RSA public key crypto system uses different keys for encryption and decryption. In RSA system key used for coding is called public key as it is available to public while the key used for decoding is a secret one - private key. As RSA is too slow (coding and decoding), so it is used to code the key of DES.

    Cryptographic algorithms

    Symmetric key : IDEA, DES, Tripple DES, Blowfish, RC4, RC5 etc.
    Public key : RSA, Elgamal, DSS, Diffie-Hellman key exchange, MD5, SHA etc.

    Cryptographic systems in use for E-mail are Secure Socket Layer (SSL), Pretty Good Privacy (PGP), Multipurpose Internet Mail Extensions (MIME) etc.

  7. #57
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default Virus threat

    Virus threat

    Before opening (unzipping) E-mail attachments, Floppy or CD scan it for viruses. Virus e-mail attachments has file extensions like .vbs, .hta, .ocx, .shs etc. Common viruses are written to exploit softwares like MS Word and Outlook.

    Formatting cannot remove boot sector viruses like 'stoned'. Use anti virus software to remove the virus. Virus fills a PC with it's own copy while a Worm replicate only to new computers through networks. Stealth viruses try to hide from OS and anti virus software while retro virus attacks the anti virus software and can disable it's files.

    Info on Virus hoax : www.vmyths.com, www.icsalabs.com, www.virusbtn.com

    Anti virus software : www.symantec.com, www.f-secure.com, www.antivirus.com

  8. #58
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default Computer Security

    Computer Security

    Computer can accept 40 to 80 characters as password. Construct a complicated password with alpha numerals and special characters, so that cracking the password will be difficult. Normal passwords are cracked with built in dictionary. Use acronyms related to self as password. e.g. - date of birth, first 3 letters of name, last 4 letters of favorite movie etc.

    A 36 character password takes minimum 12*10^8 years to discover !. Use truly random combination, hard to remember & longer passwords. Change the default password at the earliest. e.g. - system, test, demo, instrument, hello, admin, guest, sysadmin etc.

    In windows 95, Escape key bypasses the password.

  9. #59
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default Computer Security

    Computer Security

    Change password after a specified time period. Store the info and passwords at a different place in a file with password to open (Password filename with extension removed : 9instma). Information can be buried in vast amount of other data.

    Two words can be combined to form a password. e.g. - demoment takes 1140 year to crack.

    Mix initials with an reverse date. e.g. - BZpY2002bef10 takes 12*10^7 year to discover.

    Line of a poem or poems. e.g. - orayiramkinakkalalhalleluya takes 3*10^21 year to discover !.

    Physical threats to data are theft, vengeance of an employee - dust, magnetism, breaking, lightning, tea, scratches and even urination ! etc., fire, bombing, electromagnetic pulse due to nuclear explosions, power fluctuations, temperature variations, humidity, static electricity (due to friction - carpets, shoes and earthing are remedies).

    Data can be secured using offsite data storage, sonar intruder alarm, identification of employee using one or more of the following - fingerprint, voice, identity card, weight, writing style, colour of eye, geometry of hand, secret codes etc.

  10. #60
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default Encryption

    Encryption (making codes)

    n th alphabet in a word is encrypted using an integer m. Such action will be repeated p times. Deciphering (decoding) is done using key or computer programs. Computer generated random numbers can also be used.

    'Cat' will be coded as 'Knv' using the random numbers (8, 13, 2).

    Once a standard coding system is made, it is benchmarked by experts. Encrypted communication using computer softwares lie DES (Data Encryption Standard), 3DES and PKE are difficult to crack.

    Transfer of encrypted message : Remove n th letter from each word and send it separate.

Page 6 of 12 FirstFirst ... 45678 ... LastLast

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •