Abstract
Information protection is a key goal to most of information security controls. Without information hiding and protection mechanisms the whole e-commerce and remote communication mechanisms will not be possible. As users in the Internet communicate without seeing each other, mechanisms should exist to validate the identity of each party of the communication activity to the second party. Their communication and all information exchanged between them should be also protected so that no third party can possible see or expose such data or information.
In this chapter, we will focus on three important activities related to information processing: Information hiding or protection through encryption and information integrity verification through hashing and information concealment through steganography and watermarking.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Goldwasser, S., & Bellare, M. (2008). Lecture notes on cryptography. Summer course on cryptography, MIT, 1996–2001.
https://www.cs.drexel.edu/~introcs/Fa11/notes/10.1_Cryptography/RSA_Express_EncryptDecrypt.html
https://www.cs.drexel.edu/~jpopyack/IntroCS/HW/RSAWorksheet.html
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this chapter
Cite this chapter
Alsmadi, I., Burdwell, R., Aleroud, A., Wahbeh, A., Al-Qudah, M., Al-Omari, A. (2018). Encryption and Information Protection/Integrity and Concealment Methods: Lesson Plans. In: Practical Information Security. Springer, Cham. https://doi.org/10.1007/978-3-319-72119-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-72119-4_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72118-7
Online ISBN: 978-3-319-72119-4
eBook Packages: EngineeringEngineering (R0)