IST 195 Lecture Notes - Lecture 7: Steganography, Multi-Factor Authentication, Data Theft
Document Summary
Only the sender and the receiver know the code to unlock the message. Messages can even be typed or hidden into images. A method of transforming information in order to hide its content. A key is used to decrypt information after it has been encrypted. Ciphertext is how a message appears when it is encrypted. Shift - move letters of the alphabet around. Words as keys - removing duplicate letters. Kryptos = statue in front of the cia headquarters that is heavily encrypted; this will be on the test. Multi-factor authentication = does not rely only on username and password. Passwords compromised all the time, so multi-factor greatly increases safety.