Cryptography

Public Key Cryptography and PuTTYgen – Program for Generating Private and Public Keys

In today's electronic world where everything is done online, "trust" is hard to come by. Conversations can be snooped on, credit card numbers can be stolen,

ECC: A Case for Mobile Encryption

Introduction: It is needless to start this article by talking about the rise of mobile devices in the last few years. We all know how smart phones have swept

Steganography and Steganalysis: Common Image Formats and LSB Part 2

JPEG One of the most common image formats is JPEG. It surely deserves a particular discussion, and, in addition, it's very frequently used as Cover Media, in

Steganography and Steganalysis: Common Image Formats and LSB

Part 1: Introduction The information revolution, which resulted in the Internet and in modern communication technologies, has pushed our society more and mor

Symmetric and asymmetric encryption

This article explains how symmetric and asymmetric encryption work. It also describes how to build a secure mail system using these two types of encryption.

Backup Media Encryption

The problem Information Security is like a chain: it is only as strong as its weakest link. You can protect your network with expensive firewalls, use audit

Protect Data by Preventing Insecure Cryptographic Storage

Daily, we read news about hacking and data leaks. Hackers are really active these days. So, it is our responsibility to prevent them in getting unauthorized

Using Hashes in Computer Security

1. Introduction Hashes are often used in computer security. This article presents how data integrity, authenticated data integrity and non-repudiation can

Steganography: What your eyes don’t see

Steganography is the art of hiding information to prevent detection of a hidden message. It has been used throughout history by many methods and variation, a

Encryption – Anything to Declare?

Encryption is a great tool for reducing risks of the loss and interception of data. Encryption technology it has become increasingly deployable and powerful