ExamGecko
Question list
Search
Search

Related questions











Question 97 - 212-81 discussion

Report
Export

The art and science of writing hidden messages so that no one suspects the existence of the message, a type of security through obscurity. Message can be hidden in picture or audio file for example. Uses least significant bits in a file to store data.

A.
Steganography
Answers
A.
Steganography
B.
Cryptosystem
Answers
B.
Cryptosystem
C.
Avalanche effect
Answers
C.
Avalanche effect
D.
Key Schedule
Answers
D.
Key Schedule
Suggested answer: A

Explanation:

Steganography

https://en.wikipedia.org/wiki/Steganography

Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video.

The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic. Generally, the hidden messages appear to be (or to be part of) something else: images, articles, shopping lists, or some other cover text. For example, the hidden message may be in invisible ink between the visible lines of a private letter. Some implementations of steganography that lack a shared secret are forms of security through obscurity, and key-dependent steganographic schemes adhere to Kerckhoffs's principle.

Incorrect answers:

Avalanche effect - the desirable property of cryptographic algorithms, typically block ciphers and cryptographic hash functions, wherein if an input is changed slightly (for example, flipping a single bit), the output changes significantly (e.g., half the output bits flip). In the case of high-quality block ciphers, such a small change in either the key or the plaintext should cause a drastic change in the ciphertext.

Cryptosystem - a suite of cryptographic algorithms needed to implement a particular security service, most commonly for achieving confidentiality (encryption)

Key Schedule - an algorithm for the key that calculates the subkeys for each round that the encryption goes through.

asked 18/09/2024
Md Ali Uz Zaman
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first