Found 359 Articles for Information Security

What are Steganography in information security?

Ginni
Updated on 11-Mar-2022 11:04:15

3K+ Views

Steganography is an approach that facilitates concealing of a message that is to be kept secret inside other message. This result is the concealment of the secret message itself.Steganography approach can be used to images, a video file or an audio file. Generally, however, steganography is written in characters such as hash marking, but its usage inside images is also common. At any rate, steganography secure from pirating possess materials as well as aiding in unauthorized viewing.One use of steganography such as watermarking which hides copyright data within a watermark by overlaying documents not simply detected by the naked eye. ... Read More

What is Cryptanalysis in Information Security?

Ginni
Updated on 11-Mar-2022 11:00:35

2K+ Views

Cryptanalysis is the decryption and inquiry of codes, ciphers or encrypted text. Cryptanalysis need numerical rule to search for algorithm susceptibility and divide into cryptography or information security systems.The main objective of cryptanalysis is to discover weaknesses in or otherwise defeat encryption algorithms. This research can be used by cryptographers to enhance and strengthen or else restore irreparably flawed algorithms.These type of attack exploits the nature of the algorithm to acquire the plaintext or the key being utilized from the encrypted message.Cryptanalysis generally require a direct examination of the cryptosystem in place, frequently an advanced focused mathematical effort at decryption ... Read More

What are the classification of security attacks in information security?

Ginni
Updated on 11-Mar-2022 10:57:15

2K+ Views

There are various classification of security attack is as follows −Cryptanalytic attacks − These attacks are combination of statistical and algebraic techniques objective at make sure the secret key of a cipher. These technique inspect the numerical properties of the cryptographic algorithms and aims at discovering distinguishers of the output distribution of cryptographic algorithms from the uniform distribution.Non-cryptanalytic attacks − Non-cryptanalytic attacks do not exploit the numerical weakness of the cryptographic algorithm. There are three objective of security are confidentiality, integrity and availability can be very much vulnerable by this type of attack.Attacks threatening confidentiality − Attacks threatening the confidentiality ... Read More

What are the substitution techniques in information security?

Ginni
Updated on 14-Sep-2023 01:37:03

35K+ Views

Substitution technique is a classical encryption approach where the characters present in the initial message are restored by the other characters or numbers or by symbols. If the plain text (original message) is treated as the string of bits, thus the substitution technique would restore bit pattern of plain text with the bit pattern of cipher text.There are various types of substitution ciphers which are as follows −Monoalphabetic Cipher − In monoalphabetic substitution cipher, a character in a plaintext is always restored or changed to the similar character in the ciphertext indifferent of its position in the text.For instance, if ... Read More

What are the types of security mechanism in information security?

Ginni
Updated on 11-Mar-2022 10:51:51

2K+ Views

There are various types of security mechanism which are as follows −Physical Security − Physical security define limiting access to key network resources by maintaining the resources behind a locked door and secured from natural and human-made disasters.Physical security can secure a network from unintended exploitation of network equipment by untrained faculty and contractors. It can also secure the network from hackers, competitors, and terrorists walking in off the street and changing equipment configurations.It is based on the level of protection, physical security can secure a network from terrorist and biohazard events, such as bombs, radioactive spills, etc. Physical security ... Read More

What are the security services of Information Security?

Ginni
Updated on 11-Mar-2022 10:48:54

33K+ Views

There are various security services which are as follows −Message Confidentiality − The principle of confidentiality defines that only the sender and the intended recipient should be capable to create the element of the message. It protects the transmitted data from passive attack.Confidentiality can be used at several levels on the basis of content of an information to be transmitted. There are the following types of confidentiality which are as follows −Connection Confidentiality − The protection of all user information on a connection.Connectionless Confidentiality − The security of all user data in an individual data block.Traffic-flow Confidentiality − The protection ... Read More

What are True Random Number Generation?

Ginni
Updated on 11-Mar-2022 10:46:58

2K+ Views

A true random number generator (TRNG) uses a nondeterministic source to make randomness. Most function by measuring unpredictable natural processes, including pulse detectors of ionizing radiation activities, gas discharge tubes, and leaky capacitors.Intel has developed a commercially accessible chip that samples thermal noise by developing the voltage measured across undriven resistors. TRNG generates a true random number and is produced generally by hardware method.Because the random number produced by TRNG is complex to predict because TRNG is generated based on a physical source that is complex to forecast a random value. Hence, the random number produced from TRNG is a ... Read More

What is a Feistel Cipher in Information Security?

Ginni
Updated on 11-Mar-2022 10:45:01

544 Views

A Feistel cipher is a cryptographic approach used in the construction of block cipherbased algorithms and structure. A Feistel network implements a sequence of iterative ciphers on a block of information and is frequently designed for block ciphers that encrypt huge quantities of data.A Feistel network operates by splitting the data block into two same pieces and using encryption in multiple rounds. Each round implements permutation and sequence derived from the primary function or key. The number of rounds change for each cipher that implements a Feistel network.A Feistel cipher is a multi-round cipher that divides the current private state ... Read More

What is the comparison between Stream Cipher and Block Cipher in information security?

Ginni
Updated on 11-Mar-2022 10:41:12

448 Views

Stream CipherA stream cipher is one that encrypts a digital data flow one bit or one byte at a time. Stream Cipher generally encrypts one byte of the message at that moment rather than using blocks.For example, classical stream ciphers are the auto crucial Vigenère cipher and the Vernam cipher. In the conceptual case, a one-time pad version of the Vernam cipher can be used, in which the key stream is considering the plaintext bit stream.If the cryptographic key stream is arbitrary, therefore this cipher is unbreakable by some different means other than realizing the key stream. However, the key ... Read More

What is a Cryptosystem in Information Security?

Ginni
Updated on 11-Mar-2022 10:38:02

340 Views

A cryptosystem is also called a cypher system. It implements cryptographic techniques using several cryptographic components including plain text, encryption algorithm, cypher text, decryption algorithm, and encryption key to support information security services.A cryptosystem is a set of algorithms such as one for the encryption of data and another for decryption. In these algorithms, it can use a unique key that must be kept secret, and in which case the process for making and sharing the key is also considered an element of the cryptosystem.Cryptanalytic attacks based on the feature of the algorithm added possibly some knowledge of the general ... Read More

Advertisements