Data Hiding: Data hiding is the technique that does not allow certain aspects of an object to be observed or accessed. Data and information hiding keeps the programmer from having complete access to data structures. It allows access to only what is necessary.
Layering: Cyber security uses multiple layers of defense or protecting information. If one layer is defeated the next layer should catch it.
Least Privilege: One of the ways to protect information is by limiting what people can see and do with your information and resources. The principle of least privilege says to allow the minimum number of privileges necessary to accomplish the task.
Pre-digital era Ciphers: Transposition ciphers – rearrange the order of the characters of plaintext also called permutation ciphers The arrangement becomes the key Substitution ciphers – replace the characters with something else (e.g. another character or number) The replacement function becomes the key
In this lesson, we will learn about ciphers and basic cryptography and how it can apply to cybersecurity and other areas of education. We will go over a brief history of the usage of ciphers and how they work.
By the end of this tutorial, you will be able to:
data hiding
, layering
, and least privilege
in terms of cryptographyNone
Plaintext/Cleartext - an unaltered message as it’s intended to be read
Ciphertext – message that has been changed so its meaning is concealed
Encryption/enciphering – changing plaintext to ciphertext
Decryption/deciphering – changing ciphertext back into plaintext
Key – secret value needed to encrypt and/or decrypt
Cryptographic Algorithm/cipher – a standard sequence of computational steps to encrypt or decrypt a message using a key
Cryptanalysis – practice of analyzing encrypted messages to reveal the plaintext without knowing the key
Strength – determines how much effort and how long it takes to break a ciphertext
We will discuss the usages and history of each of these ciphers.
Using the cipher rings we will practice encoding and decoding.
Try some different encryption yourself.
In this lesson, we saw how encryption can be used for data hiding
. Multiple encryption rounds can also be used as for layering
.
For more information, investigate the following:
Special thanks to Dr. Robin Gandhi for reviewing and editing earlier versions of this lesson.
Nebraska GenCyber
is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Overall content: Copyright (C) 2017-2018 Dr. Matthew L. Hale, Dr. Robin Gandhi, Dr. Briana B. Morrison, and Doug Rausch.
Lesson content: Copyright (C) Chris Daniels 2017.
This lesson is licensed by the author under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.