Techniques of Information Security:
To provide the security to data in information system various security mechanism is used which is as follow but these are implemented as only for theoretically.
Example:
Data confidentiality: Encipherment and routing control
Data Integrity : Encipherment, Digital Signature, Data Integrity
Authentication : Encipherment, digital signature, authentication exchanges
Nonrepudiation : digital signature, data integrity, notarization(trusted third party to control the communications)
Access Control: Access control mechanisms
There are mainly two techniques are used for actual security to data information systems which are:
- Cryptography
- Steganography
1. Cryptography Techniques
Some of above security mechanism is implemented by Cryptography.
Cryptography can be understand as secret writing. Cryptography terms can be refered as the science and art of transforming message to make them secured from attacks.
Generally it is used to refer encryption and decryption using secret keys but It is actual refer to Symmetric-key Encipherment, Asymmetric-key encipherment and hashing.
In Encryption Plaintext is converted into cyphertext and in Decryption reverse process is applied.
Symmetric-key Encipherment
In symmetric key encipherment, also called secret key cryptography, sender encrypts the message using a encryption algorithm with secret key and receiver decrypts the message using same secert key.
Asymmetric-key Encipherment
In asymmetric key encipherment, also called public key cryptography, we have a same process except there are two key is used (public key and private key). In this cryptography, sender encrypts the message using receiver’s public key and receiver decrypts message using its own private key.
Hashing
Hashing technique uses fixed length message digest created out of a variable length message which is smaller than the message. sender sends both message and the digest to provide data integrity.
2. Steganography
Steganography can be called as covered writing instead of secret writing. Cryptography hides the content of message using enciphering and Steganography hides the content of message itself by covering it with something else.
You May also like…