background preloader

Encryption

Facebook Twitter

Steganography 101 using Java. Java Programming, Notes # 732 Preface What in the world is steganography?

Steganography 101 using Java

This lesson is about steganography, (hidden writing) which should not be confused with stenography(shorthand). According to Wikipedia, Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message; this is in contrast to cryptography, where the existence of the message is clear, but the meaning is obscured. Steganography in spam Because my email address is plastered all over the Internet, I receive an average of about 10,000 spam messages each month.

(If you view the raw HTML source text, you see that the characters spell out random words and sentences and the name of the drugs don't appear anywhere in the text.) In this case, the intended recipient of the secret content (names and prices of drugs) is the recipient of the email message. A cover message Once again, according to Wikipedia, Successful so far A romantic tryst. Signing Messages using Redundancy Functions in Java. Java Programming, Notes # 731 Preface A series on cryptography in Java This lesson is one in a series designed to teach you about the inner workings of cryptography using Java.

Signing Messages using Redundancy Functions in Java

The first lesson was entitled Public Key Cryptography 101 Using Java. The previous lesson was entitled Digital Signatures using Message Digests with Java. Public key cryptography and the RSA algorithm Let's begin this lesson by recapping what you have learned so far in this series. Introduction to digital message signing. Digital Signatures using Message Digests with Java. Java Programming, Notes # 730 Preface.

Digital Signatures using Message Digests with Java

Message Digests 101 using Java. Java Programming, Notes # 729 Preface Third in a series This is the third lesson in a series designed to teach you something about the inner workings of cryptography using Java.

Message Digests 101 using Java

The first article in the series was Public Key Cryptography 101 Using Java. The previous lesson was entitled Digital Signatures 101 using Java. Not a lesson on JCE The lessons in this series do not provide instructions on how to use the Java Cryptography Extension (JCE). Not intended for production use The programs that I will provide and explain in this series of lessons are not intended to be used for production cryptography. The programs that I will provide in this series are intended to help you to experiment with and to learn about various cryptographic and secure hash algorithms and to gain a better understanding of how they work, and why they do what they do. Viewing tip You may find it useful to open another copy of this lesson in a separate browser window. Theoretical basis and practical implementation Preview.

Digital Signatures 101 using Java. Java Programming, Notes # 728 Preface A simple protocol A variety of protocols are available for the use of public-key cryptography and digital signatures to protect the authenticity, integrity, and confidentiality of a message.

Digital Signatures 101 using Java

This lesson explains a simple and easily understood protocol. Future lessons will explain more sophisticated protocols. Second in a series This is the second lesson in a series designed to teach you something about the inner workings of cryptography using Java. Not a lesson on JCE The lessons in this series do not provide instructions on how to use the Java Cryptography Extension (JCE). Not intended for production use The programs that I will provide and explain in this series of lessons are not intended to be used for production cryptography.

Viewing tip You may find it useful to open another copy of this lesson in a separate browser window. Theoretical basis and practical implementation Supplementary material Background Information New uses in modern times Key management. Public Key Cryptography 101 Using Java. Java Programming, Notes # 727 Preface First in a series This is the first lesson in a series designed to teach you something about the inner workings of cryptography using Java.

Public Key Cryptography 101 Using Java

Hopefully, when you finish studying the lessons in this series, you will have learned a little about what goes on "under the hood" when you apply a cryptographic process. Not a lesson on JCE The lessons in this series do not provide instructions on how to use the Java Cryptography Extension (JCE). Not intended for production use The programs that I will provide and explain in this series of lessons are not intended to be used for production cryptography. The programs that I will provide in this series are intended to help you to experiment with and to learn about various cryptographic algorithms and to gain a better understanding of how they work, and why they do what they do. Viewing tip You may find it useful to open another copy of this lesson in a separate browser window.

Background Information.