Encryption and Information Protection/Integrity and Concealment Methods: Lesson Plans
Information protection is a key goal to most of information security controls. Without information hiding and protection mechanisms the whole e-commerce and remote communication mechanisms will not be possible. As users in the Internet communicate without seeing each other, mechanisms should exist to validate the identity of each party of the communication activity to the second party. Their communication and all information exchanged between them should be also protected so that no third party can possible see or expose such data or information.
In this chapter, we will focus on three important activities related to information processing: Information hiding or protection through encryption and information integrity verification through hashing and information concealment through steganography and watermarking.
- Goldwasser, S., & Bellare, M. (2008). Lecture notes on cryptography. Summer course on cryptography, MIT, 1996–2001.Google Scholar