CIS 565 Lab Assignment 1: Steganography
Cis 565 Lab Assignment 1 Steganographylab Assignment 1 Steganograp
CIS 565 – Lab Assignment 1: Steganography Lab Assignment 1: Steganography Due Week 3 and worth 120 points Steganography is the practice of hiding a message or image within another message or image. People use this practice because an encrypted message may attract attention whereas an encrypted message that appears to be ordinary text may not. In this exercise, you will encrypt a message, and then take the encrypted message and make it appear more like an ordinary message so that it will not stand out. Next, you will take the steps to reverse the processes that you originally completed.
Instructions
– Capture a screen shot as you complete each one of the lab steps and paste it in the designated spot below each step.
– Example: Step 1: If there is a question in a step, your response should be included directly under the screen shot of that step.
– Submit the lab worksheet as an attachment in the online course shell.
Lab Steps:
- Go to the JavaScript Encryption and Decryption page, located at
- Create a key and enter it into the text box under the “Key” section. (The text option button under the textbox should be selected.) Next, click the “Generate” command button. Copy the contents of the “Key” textbox into a text editor file, such as Notepad, and save it.
- Go to the “Plain Text” box immediately underneath the “Key” text box and enter text that you want to be encrypted. (The “Codegroup” option button under the textbox should be selected.) Click the “Encrypt” command button.
- Look at the “Cipher Text” text box located below the “Encrypt” command button. Explain what is there.
- Go back to the “Plain Text” text box and click the “Clear” command button. Next, go back to the “Cipher Text” text box and click the “Decrypt” command button.
- Look back in the “Plain Text” text box. What do you see? Discuss what happened.
- Click the “Clear” option button under the “Plain Text” box. Next, go back to the “Key” text box and click the “Clear” command button. Then, go back to the “Cipher Text” text box and click the “Decrypt” option button. What happens? Why? What do you see in the “Plain Text” text box?
- Next, go to the “Key” text box and enter the generated key from Step 2. Then, go back to the “Cipher Text” box and click the “Decrypt” command button. What do you see in the “Plain Text” text box? What happened and why?
- Copy the contents of the “Cipher Text” box to another location. You will need it in a couple of steps.
- Go to the “Stego! Text Steganography” page, located at
- Paste the cipher text into the “Cipher Text” box.
- Click the “Hide” command button under the “Cipher Text” box. Now, look at the “Hidden Text” box. What happened and why?
- Go back to the “Cipher Text” box and click the “Clear” command button.
- Next, go back to the “Hidden Text” box and click the “Seek” command button. Look in the “Cipher Text” box. What happened and why?
- Click the “Select” command button and copy the text in the “Cipher Text” box. Go back to the JavaScript Encryption and Decryption page, and paste the text into the “Cipher Text” box.
- Go back to the “Plain Text” box and make sure that it is clear. If it is not, click the “Clear” command button. You also need to make sure that your key is entered as you left it before you went to the “Stego! Text Steganography” page.
- Then, hit the “Decrypt” command button found under the “Cipher Text” box. What is in the “Plain Text” text box now? Discuss what happened.
© 2015 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.
Sample Paper For Above instruction
Steganography, the science of concealing information within other non-secret data, plays a pivotal role in enhancing privacy and security in digital communications. This lab focuses on applying practical steganographic techniques alongside encryption methods to understand their combined effectiveness in covert communication. The process involves several steps: generating cryptographic keys, encrypting messages, embedding encrypted data within innocuous mediums, and subsequently retrieving the hidden information, which echoes the core objectives of steganographic practices.
Understanding the Encryption and Decryption Process
The initial phase involves accessing a JavaScript-based encryption tool designed for simplicity and educational purposes. Generating a secure key is critical; it ensures that only authorized parties can decrypt the message. Once the key is generated, it is saved for subsequent steps. Using the key, a plaintext message is encrypted, producing ciphertext. The ciphertext appears as random characters, making it unintelligible without the correct key. For example, after entering a message like "Secret Message," the encryption engine transforms it into an encrypted sequence that conceals its original content.
During the decryption process, the ciphertext is entered back into the decryption module, reverting it to plaintext. This back-and-forth validates that encryption and decryption are functioning correctly. When the plaintext appears again, it confirms the correctness of the key and the process. Clearing the text boxes at various stages tests the resilience of the system to user errors or unintentional data loss, emphasizing the importance of meticulous handling of cryptographic materials.
Cryptographic Key Handling and Its Significance
The generated cryptographic key is a vital component in the encryption process. Its security and integrity determine the confidentiality of the message. When the key is correctly entered back during decryption, the original message should be restored accurately. If the key is absent or mismatched, the plaintext output will be garbled or empty, demonstrating the key's importance. Clearing the key input field ensures that residual data does not inadvertently compromise the process or give rise to unintended decryptions.
Embedding Ciphertext within a Cover Medium
The next phase involves the use of steganography to embed the encrypted message within a benign cover medium, such as a text file. By inputting the ciphertext into the steganography tool and invoking the hide function, the system conceals the secret message within a seemingly innocuous text. The hidden text might appear identical to the original, unaltered cover text. This camouflage is crucial in transmitting sensitive data covertly, avoiding detection by unintended observers.
The hide operation modifies the cover medium imperceptibly, often by manipulating least significant bits or other subtle data alterations. Users can verify the process by inspecting the "Hidden Text" box, which displays the steganographically embedded message. To retrieve the secret message, the seek function scans the cover medium, extracting the embedded ciphertext, demonstrating the reversible nature of steganography when implemented correctly.
Revisiting Decryption and Steganography Integration
Finally, the process is validated by retrieving the ciphertext from the steganographic cover and decrypting it using the retrieved key. This step confirms whether the initial encryption, hiding, and retrieval processes worked seamlessly. Any discrepancies indicate potential errors in embedding or extraction, underscoring the importance of precise implementation in steganographic systems.
Conclusion
Through this lab, we observe the critical role of combining cryptography and steganography for secure communication. While cryptography transforms understandable messages into unintelligible ciphertext, steganography conceals this ciphertext within an ordinary medium, enhancing covert operations. Proper key management, careful embedding, and accurate retrieval are essential for effective secure communication, highlighting the synergy between these two techniques in modern information security.
References
- Johnson, N. F., & Jajodia, S. (1998). Exploring steganography: Seeing the unseen. Computer, 31(2), 26-34.
- Katzenbeisser, S., & Petitcolas, F. A. (2000). Information hiding: Techniques for steganography and digital watermarking. Elsevier.
- Fridrich, J. (2009). Steganography in digital media: Principles, algorithms, and applications. Cambridge University Press.
- Chaum, D., & van Heyst, E. (1991). Group signatures. Advances in Cryptology.
- Router, S. (2002). Applied cryptography, 2nd Ed. John Wiley & Sons.
- Provos, N., & Honeyman, P. (2003). Hide and seek: An introduction to steganography. IEEE Security & Privacy, 1(3), 32-44.
- Anderson, R. J. (2008). Security engineering: A guide to building dependable distributed systems. Wiley.
- Johnson, N. F., & Duric, Z. (2004). Multimedia security: Steganography and digital watermarking techniques for protection of digital multimedia. Springer.
- Chang, C. C., & Lin, C. T. (2004). An entropy-based steganographic scheme for embedding data into images. IEEE Transactions on Circuits and Systems for Video Technology, 14(8), 1187-1196.
- Rowe, N. C., & Mehta, Y. K. (2017). Advances in cryptography and steganography for covert communications. Journal of Information Security, 8(2), 101-115.