CRYPTOGRAPHY AND STEGANOGRAPHY, METHODS TO HIDE INTELLIGENCE PRODUCTS

Authors

  • Adrian IVAN Universitatea Națională de Apărare „Carol I”

Abstract

Abstract: Intelligence plays a very important role in supporting decision-making. Once intelligence has been collected, it must be sent as quickly as possible to the decision-maker, but prior to transmission, the intelligence product must be encrypted, hidden from view. Well-known and widespread techniques by which intelligence is manipulated for the purpose of encoding/encryption and hiding its existence are cryptography and steganography.
Keywords: intelligence; cryptography; steganography; key; code; encrypted message.

Author Biography

Adrian IVAN, Universitatea Națională de Apărare „Carol I”

Născut la data 22.12.1977, în localitatea Buzău, Adrian Ivan este absolvent al Academiei Trupelor de Uscat „Nicolae Bălcescu”, Sibiu, promoţia 2000. Pregătirea academică şi-a completat-o prin absolvirea mai multor cursuri/studii universitare de masterat, stagii de pregătire. De profesie cadru militar, își desfășoară activitatea, în calitate de ofițer, în cadrul Ministerului Apărării Naționale. Maior doctorand în „Științe militare”, în ultimul an, la Universitatea Națională de Apărare „Carol I”, București, este autorul mai multor articole şi comunicări ştiinţifice, apărute la Editura UNAp.

References

*** AJP 2.0, „Allied Joint doctrine for Intelligence, Counterintelligence and Security”, 2003.

Berg, George; Davidson, Ian; Duan, Ming-Yuan and Goutam, Paul, „Searching ForHidden Messages: Automatic Detection of Steganography”, Computer Science Department University at Albany, Washington, USA.

FM 2-0, „Intelligence”, Department of the Army, Washington, May 2004, USA.

Groza, Bogdan, „Introduction to Cryptography, Cryptographic Functions, Mathematical and Computational Foundations”, Politehnica Publishing House, 2012.

Hellman, Martin Edward;Whitfield, Diffie and Merkle, Ralph, „New Directions in Cryptography”, Transactions on Information Theory, Vol. IT-22, No. 6, November 1976.

Konheim, A., „Computer Security and Cryptography”, Wiley Interscience, 2007.

Joseph, Raphael; Sundaram, V.,„Cryptography and Steganography – A

Survey”, Int. J. Comp. Tech. Appl., Vol 2 (3), USA.

Rausch, Peter; Sheta, Alaa; Ayesh ,Aladdin, “Business Intelligence and

Performance Management” Theory, Systems, and Industrial Applications,

Springer Verlag U.K., 2013.

Raţiu, Crina Anina, “Optimization and Security of E-Business Systems”, PhD thesis, Cluj-Napoca, 2016.

Zielińska, Elżbieta; Mazurczyk, Wojciech; Szczypiorski; Krzysztof, „Development Trends in Steganography”, WarsawUniversity of Technology, Warsaw 2012, Poland.

Simion, Emil; Naccache, 11. David; Mihaiţă, Adela; Olimid, Ruxandra Florentina; Oprina Andrei George, „Criptography and Information Security”, Matrixrom Publishing House, Bucharest, 2012.

Wayner, P., „Disapearing Cryptography - Information Hiding: Steganography & Watermarking (Second Edition)”, Morgan

Kaufmann Publishers, 2002, USA.

Downloads

Published

2018-06-23

How to Cite

IVAN, A. (2018). CRYPTOGRAPHY AND STEGANOGRAPHY, METHODS TO HIDE INTELLIGENCE PRODUCTS. BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY, 7(1). Retrieved from https://revista.unap.ro/index.php/bulletin/article/view/48-52

Issue

Section

Articles