Security Engineering/Cryptography. After reading this week’s materials, please respond to one or more of the following questions. 1. Define steganography and discuss a method of how steganography is accomplished. 2. What is a cryptosystem and what services can cryptosystems provide? Give an example of a cryptosystem and describe its operation. 3. Describe the operation of a one-time pad (OTP) and give an example of a device that uses an OTP either from your own experience or from research. 4. What are the types of message integrity controls and what benefit is provided by them? Give a short description of the various secure email protocols that are referenced in the textbook. 5. What benefit do digital signatures provide and what are their characteristics? In your own words, what does non-repudiation mean? 6. What factors affect the strength of an algorithm or cryptosystem? What are some common weaknesses that affect them? 7. Describe the functions of key management. What is a key escrow?

    Assurance Engineering/Cryptography

    Stenography

    The counsel assurance technique that is Stenography has ordinary plenteous hype in the modern gone-by. The despatch can be attributed to the noise by counsel technology stakeholders to to express the dread that encryption strategies may be outlawed, coupled with the efforts of to restrain mark of metaphysical nature copyrighting concurrently the lines of copyrights, contact in address of counsel assurance such as contact in literally production such as voice, books and films and the contact of other techniques such as watermarking. This is a manner of hiding grounds that entails attaching grounds to other polishs, ce precedence, audio polishs and digital pictures and computer polishs that do referable attributable attributable attributable localize whole of its boundlessness in bits (Mehboob et al. 2008). Ce development, where grounds is mysterious by adding bits to an massive polish, the grounds may answer as a polish header, the utility is that it would be oppressive to differentiate the pristine polish from the passion.

    One-time Pad

    An OTP, popularly unconcealed as the unbreakable mode, is a grounds encryption which uses a concert of plaintext and a randomly generated guide flow. The characters of the plaintext are completely with characters of the guide flow (Galbraith et al. 2002). While using the OTP, span ocean stages are ry, the primary being the change of the alphabets in the referableice into collection, and then using a customized referable attributable attributable attributable pad with identical collection ce decryption.

    OTPs succeed in abundant variations to subserve the needs of the users. Below is an development;

    Plaintext: “T H I S  S E C R E T”

    OTP-Key: “X V H E   N O P G D Z”

    —————————————

    Cipher text: “Q C P W   F S R X H S”

    Grouped: “QCPWFSRX HS”

    References

    Galbraith, S., Malone-Lee, J., & Smart, N. P. (2002). Public guide signatures in the multi-user setting. Counsel Processing Letters, 83(5), 263-266.

    Mehboob, B., & Faruqui, R. A. (2008, April). A stenographer implementation. In Biometrics and Assurance Technologies, 2008. ISBAST 2008. International Symposium on (pp. 1-5). IEEE.