What's the difference between cryptography and steganography?

Cryptography


Definition:

  • (n.) The act or art of writing in secret characters; also, secret characters, or cipher.

Example Sentences:

  • (1) Ryan Rubin, MD of global risk consultancy Protiviti, agrees: "CryptoLocker has been designed to make money using well-known, publicly available cryptography algorithms that were developed by governments and other [legitimate] bodies.
  • (2) Bitcoin is a digital currency based on a methods of cryptography similar to those used to protect confidential emails.
  • (3) When every OAP has been taught to use the net, when every homeless person has a scavenged netbook, when protocols have mutated again to hide their users' transactions with state-of-the-art cryptography, there will be no penalty harsh enough to make the tiniest dent in filesharing.
  • (4) He was withering on the subject the NSA’s undermining of the US National Institute for Standards in Technology’s cryptography projects, saying it had “radicalised mild-mannered cryptographers.
  • (5) Earlier this month the Guardian explained how NSA and GCHQ have worked to insert mathematical weaknesses into cryptography systems used to scramble internet data and other information.
  • (6) But almost two years after he bailed from what he calls the Australian “citizen ship” (to know Murrumu is to be involved in a constant game of verbal cryptography) there seems little doubt he is doing much more than making a merely symbolic point about Indigenous sovereignty, the destructive legacy of invasion, and the urgent need for the commonwealth to strike treaties with the first nations.
  • (7) On the other side, virtually every security and cryptography expert tries patiently to explain that there’s no such thing as “a back door that only the good guys can walk through” (hat tip to Bruce Schneier).
  • (8) The focus is on learning programming skills in HTML, CSS, JavaScript, Python and other languages, with a host of classes to then push on: from applied cryptography through to robotics AI.
  • (9) Whether or not a 64-bit CPU helps, it would be surprising if Apple stepped sideways and designed a 32-bit version of the A7 with the cryptography unit and Touch ID for, say, a 32-bit Touch ID-enabled low-end iPad.
  • (10) Allan listed and responded to eight claims isolated from the report written by researchers at the Centre of Interdisciplinary Law and ICT (ICRI) and the Computer Security and Industrial Cryptography department (Cosic) at the University of Leuven, and the media, information and telecommunication department (Smit) at Vrije Universiteit Brussels.
  • (11) Bitcoins are “mined” by using computers to calculate increasingly complex algorithmic formulas and uses public-key cryptography.
  • (12) It also emerged on Wednesday that police had called in a GCHQ cryptography expert to help crack a password used to lock files within a laptop.
  • (13) Christian Payne moved a monthly gathering of cryptography fans from Bletchley Park to TNMOC after what he said was indifference to the group from the trust.
  • (14) The currency's cryptography makes it almost immune from counterfeiting and its relative anonymity holds out the promise of being able to spend money across the internet without scrutiny.
  • (15) This actually happened yesterday: A professor in the computer science department at Johns Hopkins, a leading American university, had written a post on his blog, hosted on the university's servers, focused on his area of expertise, which is cryptography.
  • (16) The Tunny traffic was produced by a Lorenz CZ cryptography machine which the Bletchley Park mathematicians were able to replicate without ever seeing it.
  • (17) A lot more people have become aware of what can be done.” Cryptography expert and author Bruce Schneier said some of the techniques the NSA used to hack routers are starting to be seen in criminal cases, amongst other attack types.
  • (18) The report, from researchers at the Centre of Interdisciplinary Law and ICT (ICRI) and the Computer Security and Industrial Cryptography department (Cosic) at the University of Leuven, and the media, information and telecommunication department (Smit) at Vrije Universiteit Brussels, was commissioned after an original draft report revealed Facebook’s privacy policy breaches European law .
  • (19) Our national security will be significantly enhanced if we store less data, not more, and increase the use of strong cryptography, rather than reducing it.” Eris Industries was formerly based in the UK, but moved to Connecticut, US, after the general election.
  • (20) Last week's report said the data stolen by Flame was encrypted "in such a way that only the attackers can read it through strong public key cryptography.

Steganography


Definition:

  • (n.) The art of writing in cipher, or in characters which are not intelligible except to persons who have the key; cryptography.

Example Sentences:

  • (1) Boyd uses the term "social steganography" to describe the practice of more than 50% of young people who use in-jokes and obscure references to effectively encode what they post.
  • (2) A determined person can get a message out in all sorts of ways: one of the smartest is to hide coded data inside the pixels of what looks like a perfectly innocent photograph, a method called steganography.
  • (3) Jihadists are also reported to conceal messages to each other inside pornographic imagery – a sort of X-rated steganography – though the contention has not been confirmed.

Words possibly related to "steganography"