
- Cryptography Tutorial
- Cryptography - Home
- Cryptography - Origin
- Cryptography - History
- Cryptography - Principles
- Cryptography - Applications
- Cryptography - Benefits & Drawbacks
- Cryptography - Modern Age
- Cryptography - Traditional Ciphers
- Cryptography - Need for Encryption
- Cryptography - Double Strength Encryption
- Cryptosystems
- Cryptosystems
- Cryptosystems - Components
- Attacks On Cryptosystem
- Cryptosystems - Rainbow table attack
- Cryptosystems - Dictionary attack
- Cryptosystems - Brute force attack
- Cryptosystems - Cryptanalysis Techniques
- Types of Cryptography
- Cryptosystems - Types
- Public Key Encryption
- Modern Symmetric Key Encryption
- Cryptography Hash functions
- Key Management
- Cryptosystems - Key Generation
- Cryptosystems - Key Storage
- Cryptosystems - Key Distribution
- Cryptosystems - Key Revocation
- Block Ciphers
- Cryptosystems - Stream Cipher
- Cryptography - Block Cipher
- Cryptography - Feistel Block Cipher
- Block Cipher Modes of Operation
- Block Cipher Modes of Operation
- Electronic Code Book (ECB) Mode
- Cipher Block Chaining (CBC) Mode
- Cipher Feedback (CFB) Mode
- Output Feedback (OFB) Mode
- Counter (CTR) Mode
- Classic Ciphers
- Cryptography - Reverse Cipher
- Cryptography - Caesar Cipher
- Cryptography - ROT13 Algorithm
- Cryptography - Transposition Cipher
- Cryptography - Encryption Transposition Cipher
- Cryptography - Decryption Transposition Cipher
- Cryptography - Multiplicative Cipher
- Cryptography - Affine Ciphers
- Cryptography - Simple Substitution Cipher
- Cryptography - Encryption of Simple Substitution Cipher
- Cryptography - Decryption of Simple Substitution Cipher
- Cryptography - Vigenere Cipher
- Cryptography - Implementing Vigenere Cipher
- Modern Ciphers
- Base64 Encoding & Decoding
- Cryptography - XOR Encryption
- Substitution techniques
- Cryptography - MonoAlphabetic Cipher
- Cryptography - Hacking Monoalphabetic Cipher
- Cryptography - Polyalphabetic Cipher
- Cryptography - Playfair Cipher
- Cryptography - Hill Cipher
- Polyalphabetic Ciphers
- Cryptography - One-Time Pad Cipher
- Implementation of One Time Pad Cipher
- Cryptography - Transposition Techniques
- Cryptography - Rail Fence Cipher
- Cryptography - Columnar Transposition
- Cryptography - Steganography
- Symmetric Algorithms
- Cryptography - Data Encryption
- Cryptography - Encryption Algorithms
- Cryptography - Data Encryption Standard
- Cryptography - Triple DES
- Cryptography - Double DES
- Advanced Encryption Standard
- Cryptography - AES Structure
- Cryptography - AES Transformation Function
- Cryptography - Substitute Bytes Transformation
- Cryptography - ShiftRows Transformation
- Cryptography - MixColumns Transformation
- Cryptography - AddRoundKey Transformation
- Cryptography - AES Key Expansion Algorithm
- Cryptography - Blowfish Algorithm
- Cryptography - SHA Algorithm
- Cryptography - RC4 Algorithm
- Cryptography - Camellia Encryption Algorithm
- Cryptography - ChaCha20 Encryption Algorithm
- Cryptography - CAST5 Encryption Algorithm
- Cryptography - SEED Encryption Algorithm
- Cryptography - SM4 Encryption Algorithm
- IDEA - International Data Encryption Algorithm
- Public Key (Asymmetric) Cryptography Algorithms
- Cryptography - RSA Algorithm
- Cryptography - RSA Encryption
- Cryptography - RSA Decryption
- Cryptography - Creating RSA Keys
- Cryptography - Hacking RSA Cipher
- Cryptography - ECDSA Algorithm
- Cryptography - DSA Algorithm
- Cryptography - Diffie-Hellman Algorithm
- Data Integrity in Cryptography
- Data Integrity in Cryptography
- Message Authentication
- Cryptography Digital signatures
- Public Key Infrastructure
- Hashing
- MD5 (Message Digest Algorithm 5)
- SHA-1 (Secure Hash Algorithm 1)
- SHA-256 (Secure Hash Algorithm 256-bit)
- SHA-512 (Secure Hash Algorithm 512-bit)
- SHA-3 (Secure Hash Algorithm 3)
- Hashing Passwords
- Bcrypt Hashing Module
- Modern Cryptography
- Quantum Cryptography
- Post-Quantum Cryptography
- Cryptographic Protocols
- Cryptography - SSL/TLS Protocol
- Cryptography - SSH Protocol
- Cryptography - IPsec Protocol
- Cryptography - PGP Protocol
- Image & File Cryptography
- Cryptography - Image
- Cryptography - File
- Steganography - Image
- File Encryption and Decryption
- Cryptography - Encryption of files
- Cryptography - Decryption of files
- Cryptography in IoT
- IoT security challenges, Threats and Attacks
- Cryptographic Techniques for IoT Security
- Communication Protocols for IoT Devices
- Commonly Used Cryptography Techniques
- Custom Building Cryptography Algorithms (Hybrid Cryptography)
- Cloud Cryptography
- Quantum Cryptography
- Image Steganography in Cryptography
- DNA Cryptography
- One Time Password (OTP) algorithm in Cryptography
- Difference Between
- Cryptography - MD5 vs SHA1
- Cryptography - RSA vs DSA
- Cryptography - RSA vs Diffie-Hellman
- Cryptography vs Cryptology
- Cryptography - Cryptology vs Cryptanalysis
- Cryptography - Classical vs Quantum
- Cryptography vs Steganography
- Cryptography vs Encryption
- Cryptography vs Cyber Security
- Cryptography - Stream Cipher vs Block Cipher
- Cryptography - AES vs DES ciphers
- Cryptography - Symmetric vs Asymmetric
- Cryptography Useful Resources
- Cryptography - Quick Guide
- Cryptography - Discussion
Cryptography vs Steganography
Steganography, often known as cover writing, is a technique for transforming a secret process into a fake-looking message. This strategy helps to keep a message secret. It is difficult to use and understand. Steganography does not alter the data structure. It can be used for text, audio, video, or images.
Cryptography, often known as secret writing, is a technique in which a secret process is encoded in cipher text and transmitted to another person, who then decrypts the cipher text into plain language. Cryptography can be characterised as symmetric or asymmetric.
Read this chapter to understand more about the differences between steganography and cryptography.
What is Steganography?
Steganography is a method of concealing information within other data. Steganography is an encryption technology that, when used with cryptography, provides an additional layer of data security.
Steganography techniques can be used to encrypt photos, movies, and audio recordings. Steganography is typically written in characters with hash marks, but it is also commonly used in graphics. Steganography, in any case, safeguards protected materials from piracy while enabling unauthorised access.
Steganography, unlike encryption, was created to be inaccessible to unauthorised third parties. Not only must the sensitive content be discovered-a difficult effort in and of itself-but it must also be encrypted, which can be difficult.
Watermarking is a type of steganography in which copyright information is concealed within a watermark by overlaying files that are difficult to recognise with a human eye. This prevents fraud and provides an additional layer of security for copyrighted media.
According to circumstantial evidence, some suspect that the terrorists who planned and carried out the 9/11 attack in New York City used steganography. This was the first time the public learned about the science of stenography. Data can be stolen and encrypted via file transfers or, more typically, through email. Steganography can also be used for covert communications involving terrorist plots, as was suspected in the 9/11 case. The military has been using steganography for decades, however it is not computer-based.
What is Cryptography?
Cryptography is a method of creating codes, whether written or generated, that allow information keep private. Cryptography encodes data in an unreadable format for unauthorised users, allowing it to be sent without the risk of unauthorised entities decoding it back into a readable format.
Cryptography is used at several levels in information security. The data cannot be read without a key to decrypt it. During transit and storage, the information remains unchanged. Cryptography also helps to ensure nonrepudiation. This means that a message's sender and delivery can be verified. Cryptography uses key pairs to authenticate senders and receivers.
Difference between Steganography and Cryptography
The following table illustrates the key differences between Steganography and Cryptography −
Key | Steganography | Cryptography |
---|---|---|
Type | Steganography refers to Cover Writing. | Cryptography refers to Secret Writing. |
Popularity | Steganography is less popular than Cryptography. | Cryptography is more popular than Steganography. |
Integrity | Structure of data remains same. | Structure of data can be altered. |
Attack | Attack in Steganography is termed as Steganalysis. | Attack in Cryptography is termed as Cryptanalysis. |
Security Principles | Steganography supports Confidentiality and Authentication. | Cryptography supports Confidentiality, Authentication, Data integrity and Nonrepudiation. |
Parameter | Steganography requires a parameter like key. | Cryptography may not need any key. |
Summary
The main difference between steganography and cryptography is that steganography maintains the structure of data, while cryptography does not. Steganography does not include numerous mathematical transformations, whereas cryptography does.