Trusted answers to developer questions
Trusted Answers to Developer Questions

Related Tags

cryptography
steganography
computer networks
encryption
network security

What is the difference between cryptography and steganography?

Affan Malik

Grokking Modern System Design Interview for Engineers & Managers

Ace your System Design Interview and take your career to the next level. Learn to handle the design of applications like Netflix, Quora, Facebook, Uber, and many more in a 45-min interview. Learn the RESHADED framework for architecting web-scale applications by determining requirements, constraints, and assumptions before diving into a step-by-step design process.

Steganography vs. cryptography

Steganography is the process of ​​preventing the leak of sensitive information by creating suspicions. Steganography usually does not change the data structure as it is a way to hide secret messages in cover mediaThis is a carrier media selected to hide the message or to carry it..

Cryptography means the sender does not send the message directly to the recipient. The plain text is converted to a ciphertext using an encryption algorithmIt is a technique or method to convert plain information into ciphertext. before being sent to the recipient. It is then decrypted from ciphertext into plain text to read the original information.

An illustration of how steganography and cryptography works

Differences

Here are some of the differences between steganography and cryptography.

Steganography

Cryptography

The structure of the data is not altered.

It alters the structure of the data while encrypting.

It hides the fact that a secret communication is taking place along with the message.

It only hides the given message.

It does not involve the role of mathematics.

It highly uses mathematical formulas and theories.

It only supports the confidentiality and authentication security principle.

It supports the confidentiality, authentication, data integrity, and the non-repudiation security principle.

RELATED TAGS

cryptography
steganography
computer networks
encryption
network security

CONTRIBUTOR

Affan Malik
Copyright ©2022 Educative, Inc. All rights reserved

Grokking Modern System Design Interview for Engineers & Managers

Ace your System Design Interview and take your career to the next level. Learn to handle the design of applications like Netflix, Quora, Facebook, Uber, and many more in a 45-min interview. Learn the RESHADED framework for architecting web-scale applications by determining requirements, constraints, and assumptions before diving into a step-by-step design process.

Keep Exploring