Disclosure: Techzet may get little commission on purchases through this page, which does not any cost to you.*Note-Prices, Discounts may vary and Coupon is for limited period..

Techniques of Information Security:

To provide the security to data in information system various security mechanism is used which is as follow but these are implemented as only for theoretically.

Example:

Data confidentiality: Encipherment and routing control

Data Integrity : Encipherment, Digital Signature, Data Integrity

Authentication : Encipherment, digital signature, authentication exchanges

Nonrepudiation : digital signature, data integrity, notarization(trusted third party to control the communications)

Access Control: Access control mechanisms

There are mainly two techniques are used for actual security to data information systems which are:

  • Cryptography
  • Steganography

1. Cryptography Techniques

Some of above security mechanism is implemented by Cryptography.

Cryptography can be understand as secret writing. Cryptography terms can be refered as the science and art of transforming message to make them secured from attacks.

Generally it is used to refer encryption and decryption using secret keys but It is actual refer to Symmetric-key Encipherment, Asymmetric-key encipherment and hashing.

In Encryption Plaintext is converted into cyphertext and in Decryption reverse process is applied.

Symmetric-key Encipherment

In symmetric key encipherment, also called secret key cryptography, sender encrypts the message using a encryption algorithm with secret key and receiver decrypts the message using same secert key.

Asymmetric-key Encipherment

In asymmetric key encipherment, also called public key cryptography, we have a same process except there are two key is used (public key and private key). In this cryptography, sender encrypts the message using receiver’s public key and receiver decrypts message using its own private key.

Hashing

Hashing technique uses fixed length message digest created out of a variable length message which is smaller than the message. sender sends both message and the digest to provide data integrity.

2. Steganography

Steganography can be called as covered writing instead of secret writing. Cryptography hides the content of message using enciphering and Steganography hides the content of message itself by covering it with something else.

You May also like…

Leave a Reply

Your email address will not be published.