Definitely. Encryption only tries to obscure the meaning of a message or data, not its actual existence. This means...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
encrypted data or messages can be relatively easy to find, but still difficult to crack. One of the main problems with encrypted messages is that it is easy to detect when encrypted communication occurs. Today's secure protocols, such as S/MIME, need to flag their presence so that programs like your e-mail client know what sort of data is being sent and can handle it correctly. Firewalls that filter network traffic can scan for encrypted messages by looking at the file's identification code.
Because encrypted data is easy to detect, people have tried to conceal when communication is taking place by hiding the existence of the message or data. To achieve this, they rely on steganography. A steganographic message is often first encrypted and then a "covertext," such as a picture or document, is modified in some way to include the encrypted message, resulting in stegotext. Nowadays, a popular steganographic method buries data in the mass of pixels in digital video and audio images. This poses serious problems for law enforcement authorities because steganographic data is hidden within seemingly innocuous files and doesn't trigger surveillance and monitoring systems. To combat this, statistical techniques are used to detect media that has been modified. Because the covertext has to be modified to store the hidden data there, are usually detectable signs within the covertext's normal characteristics that can be used to reveal the hidden message. This detection of steganographically-encoded data is called "steganalysis."
Dig Deeper on Email Security Guidelines, Encryption and Appliances
Related Q&A from Michael Cobb
What is BGP hijacking or IP hijacking and how do cybercriminals pull off the attacks? Expert Michael Cobb explains how enterprises can mitigate these...continue reading
Is the Dell eDellRoot security threat a serious problem and, if so, can it be prevented with self-signed root certificate authorities? Expert Michael...continue reading
What does FIPS 140-2 Level 2 certification for devices cover? Expert Michael Cobb explains the FIPS 140-2 security standard and how vendors use it in...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.