Data Security and Cryptography Tutorial
Data Security and Cryptography Tutorial
4. Data Recovery
a. What is Data Recovery?
The process of restoring lost, deleted, or corrupted data from various storage media.
b. Deleted Data Recovery
Recovering files that have been accidentally deleted using specialized software like Recuva or Disk
Drill.
c. Formatted Data Recovery
Restoring data from a formatted drive. Tools like EaseUS Data Recovery Wizard can help recover lost
partitions.
d. Partition Recovery
Reconstructing lost or damaged partitions to access data. Techniques include scanning with data
recovery tools like TestDisk.
5. Data Erasing
Secure data erasure involves deleting data in a way that prevents its recovery. Techniques include:
• Data Wiping: Overwriting data with random patterns.
• Degaussing: Using magnetic fields to erase data from magnetic storage.
• Physical Destruction: Shredding, incinerating, or disintegrating media.
Tools: DBAN (Darik's Boot and Nuke), Blancco Drive Eraser.
6. Cryptography Concepts
a. Types of Cryptography
• Symmetric Cryptography: Uses the same key for encryption and decryption.
• Asymmetric Cryptography: Uses a pair of keys (public and private) for encryption and
decryption.
b. Types of Encryptions
• Symmetric Encryption: Fast and efficient; requires secure key exchange.
• Asymmetric Encryption: More secure for communication, slower due to computational
complexity.
c. Encryption Algorithms
1. DES (Data Encryption Standard): Legacy symmetric algorithm using a 56-bit key.
2. Triple DES (3DES): Enhanced version of DES; applies DES three times for added security.
3. AES (Advanced Encryption Standard): Symmetric algorithm widely used today, with 128,
192, or 256-bit keys.
4. RSA: Asymmetric encryption using large prime numbers; often used for secure
communication.
d. Cryptography Tools
• GPG: A free software for encryption and signing.
• OpenSSL: A toolkit for SSL/TLS and cryptographic operations.
• VeraCrypt: A tool for disk encryption.
7. Hashing
a. Hashing Concepts
Hashing is a one-way process that converts data into a fixed-size hash value, often used for verifying
data integrity.
b. Encryption Vs Hashing
• Encryption: Reversible, aims to protect data.
• Hashing: Irreversible, aims to verify data integrity.
c. Types of Hashing
1. MD5 (Message Digest 5): Produces a 128-bit hash; vulnerable to collisions.
2. SHA (Secure Hash Algorithm):
o SHA-1: 160-bit hash, now considered insecure.
o SHA-2: 256-bit or 512-bit hash, secure and widely used.
8. Steganography
a. Overview
Steganography is the practice of hiding secret information within another file, like embedding text
within an image.
b. Steganography Techniques
• Image Steganography: Concealing information within images by altering pixel values.
• Audio Steganography: Hiding data within audio files by modifying frequency or phase.
• Video Steganography: Embedding information in video files using frame modification.
c. Types of Steganography
• Text Steganography: Hiding messages within text using invisible characters or text
formatting.
• Image Steganography: Most common, alters pixel values.
• Network Steganography: Concealing information within network traffic.
d. Steganalysis
The process of detecting hidden information in files using various analytical tools.
e. Steganography Detection Tools
• StegExpose: A steganalysis tool to detect hidden data in images.
• OpenPuff: A steganography and watermarking tool with steganalysis capabilities.