Sie sind auf Seite 1von 6

A.

Description of Cryptography and Steganography


a.Cryptography

Cryptography is the study of hiding information and it is used when

communicating over an untrusted medium such as internet, where

information needs to be protected from other third parties. Modern

cryptography focuses on developing cryptographic algorithms that are

hard to break by an adversary due to the computational hardness therefore

could not be broken by a practical means. In the modern cryptography,

there are three types of cryptographic algorithms used called Symmetric

key cryptography, Public-key cryptography and hash functions. Symmetric

key cryptography involves encryption methods where both the sender and

the receiver share the same key used to encrypt the data. In Public-key

cryptography, two different but mathematically related keys are used. Hash

functions does not use a key, instead they compute a fixed length hash

value from the data. It is impossible to recover the length or the original

plain text from this hash value.

Cryptography is a technique used to hide the meaning of a message and is

derived from the Greek word kryptos (hidden). This is different from

steganograhic techniques in that one is not hiding the actual message, only

the meaning of the message. If a message were to fall into the hands of the

wrong person, cryptography should ensure that that message could not be

read. Typically the sender and receiver agree upon a message scrambling

protocol beforehand and agree upon methods for encrypting and

decrypting messages.
b.Steganography

Steganography is data hidden within data. Steganography is an encryption

technique that can be used along with cryptography as an extra-secure

method in which to protect data.

Steganography techniques can be applied to images, a video file or an

audio file. Typically, however, steganography is written in characters

including hash marking, but its usage within images is also common. At

any rate, steganography protects from pirating copyrighted materials as

well as aiding in unauthorized viewing.

Steganography in the modern world usually refers to information or an

archive that has been hidden into a digital image, audio, or video archive.

This steganographic technique has been widely used in the strategy of

warfare and the sending of secret codes since time immemorial. In World

War II, steganographic techniques commonly used by German soldiers in

sending secret messages from or to Germany.

The more important the value of an information, the more advanced

methods that can be used to conduct information insertion is also

supported by the growing electronic media. Various kinds of electronic

media can now be used to perform various steganography functions with

various purposes and functions expected by its users. As a general


function, steganography is used to give a special stamp in a work made in

electronic media format as identification.

B. The equation between cryptography and steganography


The equation between cryptography and steganography is a technique to

hide secret files where senders and recipients know the contents of the file

or message.

For example, the sender starts with a regular image file, then adjusts the

color of every 100th pixel to match a letter in alphabet (the change is so

subtle that no one notices it if he does not really notice it).

C. Differences in cryptography and steganography


Cryptography is the study of hiding information, while Steganography

deals with composing hidden messages so that only the sender and the

receiver know that the message even exists. In Steganography, only the

sender and the receiver know the existence of the message, whereas in

cryptography the existence of the encrypted message is visible to the

world. Due to this, Steganography removes the unwanted attention coming

to the hidden message. Cryptographic methods try to protect the content of

a message, while Steganography uses methods that would hide both the

message as well as the content. By combining Steganography and

Cryptography one can achieve better security.

For example, the fundamental difference between cryptography and

steganography is the result of the message display when it has been

inserted a secret message. In cryptographic messages that have been

inserted a secret message will be very different from the message before
the secret message inserted. So for third parties who see messages

cryptographic output will be suspicious even though the third party is also

not know the intent of the message.

While on steganography, messages that have been inserted secret messages

will look the same (with the invisible) with the message before the secret

message inserted (secret message disguised in the cover text). So the third

party does not know that behind the original message (cover text) hidden

secret message behind it.

D. Examples of cryptography and steganography past and present

a.1 An example of using steganography in the past

Steganography is already known by the Greeks. Herodatus, the Greek

ruler, sent a secret message using the head of a slave or a soldier as a

medium. In this case, slave hair is slaughtered, then a secret message is

written on a slave's scalp. When the hair of a slave grows, the slave is sent

to carry a secret message behind his hair.

Then another example is the Romans recognize steganography by using

invisible ink to write messages. The ink is made from a mixture of juice,

milk, and vinegar. If ink is used for writing then the writing is not visible.

Writing on paper can be read by heating the paper.

Another method used by ancient Greek society was to use candles as a

medium for hiding their message. The message is written on a sheet, and

the sheet will be covered with a candle to hide the written message. The
recipient will then remove the candle from the sheet to view the message

delivered by the sender.

a.2 Examples of steganography in the present


What messages are hidden in the text below?

Bagaikan bintang menghiasi malam

Embun pagi membasahi rumput-rumput

Rumput rumput bergoyang seirama hembusan angin

Sawahnya menghijau

Indahnya alam ini membuatku terpaku

Kekagumanku sulit untuk kupendam

Angin berhembus halus menembus kulit

Pohon pohon mulai menyerap air yang jatuh dari langit dengan ujung
akarnya

Angin dingin kelam berderik

Daun daun berhembusan menghiasi alam ini

Indahnya alam yang telah melahirkanku

Laksana keindahan surga dihadapanku

Of course you already know. Yes ... the hidden message is "Bersikap

Adil." How? Each line beginning of the text above is the answer.

b.1 An example of cryptography in the past


For example in Caesar Cipher used 3 letters after the letter used to

encode the message. And that means to read the message, we simply

shift each letter that appears with the previous 3 letters. This method is

known as symmetric-key cryptography, where to read and encode a

message used a key or the same key.


b.2 Examples of cryptography in the present
There are many examples of cryptography today. Starting from the

cryptography created in the form of an application until there is one

website that provides text encryption very easily. Here is an example

of a text encryption application created from visual basic.

E. Create your version of cryptography

Data Asal = RUMAH


Key = 7
Data Acak ?

Das könnte Ihnen auch gefallen