Understanding Techniques for Hiding and Scrambling Information PDF
Document Details
Uploaded by EventfulAntigorite1476
Eastern Michigan University
Tags
Summary
This chapter covers steganography and cryptography techniques used for hiding evidence on computers. It explores how these ancient methods are used to protect or conceal information, from ancient origins to their practical applications. It also includes topics and goals related to using and detecting steganography and cryptography, and cryptanalysis.
Full Transcript
Digital Forensics, Investigation, and Response, Fourth Edition ISBN 9781284228236 CHAPTER 5 Understanding Techniques for Hiding and Scrambling Information 119 CHAPTER 5 Understanding T...
Digital Forensics, Investigation, and Response, Fourth Edition ISBN 9781284228236 CHAPTER 5 Understanding Techniques for Hiding and Scrambling Information 119 CHAPTER 5 Understanding Techniques for Hiding and Scrambling Information © phyZick/Shutterstock TECHNICALLY SAVVY CRIMINALS will try to hide evidence on their computers. There are any number of techniques one can use to either hide or protect information. That way, even if the computer is seized and searched, investigators are less likely to find the evidence. This chapter introduces the two ways of hiding and scrambling information: steganography and cryptography. These techniques predate modern computers. In fact, they are so old that they can trace their origins to ancient Greece. Steganography comes from the Greek steganos, meaning covered or protected. Cryptography comes from the Greek kryptos, to hide. Encrypted information is clearly scrambled, and not hidden, per se. Chapter 5 Topics This chapter covers the following topics and concepts: Understanding the use and detection of steganography Encryption Chapter 5 Goals When you complete this chapter, you will be able to: Understand steganography Use steganography Detect steganography Understand basic cryptography Utilize basic cryptography Understand general cryptanalysis techniques