Steganography Basic – The art of hiding Data Within Data

Steganography doesn’t use algorithms to encrypt data, instead it hides a data in another type of media, so it effectively conceals the data hidden within a type of media.  This type of cryptography is similar to an invisible ink method,…

In band/Out of band key exchange

There are multiple ways to exchange keys, whether it’s public or private.  I want to cover in band and out of band key exchange as well as other items related to key exchanges. In band key exchanges mean it takes…

Hashing and message digest basics

Hashing is different from encryption because hashing is designed to act as one way function.  An algorithm that is easy to perform but difficult (almost impossible) to reverse.  A hash is a string of number generated from a string of…

Symmetric and asymmetric encryption algorithms

Symmetric encryption is also known as secret key encryption or session key encryption.  This means that it uses the same key to encrypt and decrypt data.  A simple example would be moving 1 space forward for encryption and 1 space…

Information assurance basics

IA, or so called information assurance refers to steps and techniques involved in protecting information systems. Information systems include computer systems, networks, and so on. Because in the technology world, threats like viruses, worms, phishing attacks, social engineering, and identity…