IS_NIS_Differentiate Between
IS_NIS_Differentiate Between
Data
In steganography, the structure of While in cryptography, the structure
Altera o
data is not usually altered. of data is altered.
n
Basis Steganography Cryptography
Cryptography
Steganography supports Confiden ality and Authen
Security
supports Confiden ality and Authen ca on security principles as well
Principles
ca on security principles. as Data integrity and Non-
repudia on.
Mathem
In steganography, not many Cryptography involves the use of
a cal
mathema cal transforma ons are number theory, mathema cs, etc. to
Involvem
involved. modify data
ent
Informa
In Steganography the informa on is In cryptography, the informa on is
on
hidden. transformed.
Handling
Informa
The hidden informa on is not
on Transformed informa on is visible.
visible.
Visibility
Cryptography Provides
Security Steganography Provides
Confiden ality, Integrity, Non-
Services Confiden ality only.
repudia on.
Encryp on Cryptography
It is all about mathema cal and algorithmic in It is all about techniques and
nature. technologies in nature.
Encryp on Cryptography
Its main purpose is confiden ality that means Its main purpose is to apply complex
concealing content of message by transla ng mathema cs and logic to design strong
it into code. encryp on methods.
It is all about managing cyber risks in all It is all about math func ons and can be
aspects such as people, process, technology, applied in technical solu ons for
etc. increasing cybersecurity.
reduces computer freezing and crashes, privacy to its best, allows two par es to
provides privacy to users, etc. communicate securely, etc.
In firewall counter a acks are possible such In an virus no counter a acks are
as IP Spoofing and rou ng a acks. possible a er removing the malware.
Firewall checks the threat from incoming An virus checks the threat from
packets. malicious so ware.
Firewall saves the system from all kinds of An virus saves the system only from
threats to the system. viruses.
Malware is a file or a code, designed to cause Trojan Horse is a form of malware that capture some
1. damage to a user’s personal computer and important informa on about a computer system or a
network. computer network.
2. Malware is more harmful than trojan horse. Trojan horse is less harmful than Malware.
It can destroy data and resources, cause error It also give unauthorized access and control of the syst
5.
and slow down the performance. to the hackers.
Rootkit is set of malicious program that enables A Virus is a malicious executable code a ached to
1. administrator-level access to a computer another executable file which can be harmless or can
network. modify or delete data.
4. Rootkit is one of the type of malware. Virus is one of the type of malware.
It give unauthorized access and control of the It can control data and resources, cause error, destroy
5.
system to the a acker. system and slow down the performance.
TDSS, ZeroAccess, Alureon and Necurs are some Resident and Non -resident viruses are two types of
7.
of the common rootkit. Virus.
Rootkit is set of malicious program that enables A Worm is a form of malware that replicates itse
1.
administrator-level access to a computer network. and can spread to different computers via Netwo
The main objec ve of rootkit is to steal the iden ty The main objec ve of worms to eat the system
2.
informa on, o en to gain control of a system. resources.
4. Rootkit is one of the type of malware. Worms is one of the type of malware.
It give unauthorized access and control of the system It can give unauthorized access and control of th
6.
to the a acker. system to the hackers.
TDSS, ZeroAccess, Alureon and Necurs are some of Morris Worm, Storm Worm and SQL Slammer ar
7.
the common rootkit. some of the examples of worms.
Worms Trojan Horse
A Worm is a form of malware that Trojan Horse is a form of malware that capture
replicates itself and can spread to some important informa on about a
different computers via Network. computer system or a computer network.
The main objec ve of worms to eat the The main objec ve of the trojan horse is to
system resources. control the ac vity of the system.
Worms can be detected and removed Trojan horses are detected by the an virus
by the An virus and firewall. so ware.
Worms are self replica ng. Trojan horse are not self replica ng.
It can give unauthorized access and It also give unauthorized access and control of
control of the system to the hackers. the system to the hackers.
Worms are executed via weaknesses in Trojan horse executes through a program and
system. interprets as u lity so ware.
S.No. VIRUS SPYWARE
In the authen ca on process, users or While in this process, users or persons are
persons are verified. validated.
Social authen ca on
The user authen ca on is visible at user The user authoriza on is not visible at the
end. user end.
DOS DDOS
In Dos a ack single system targets the In DDoS mul ple systems a acks the vic ms
vic m system. system..
DOS DDOS
Vic m PC is loaded from the packet of Vic m PC is loaded from the packet of data
data sent from a single loca on. sent from Mul ple loca on.
In DOS A ack only single device is used In DDoS a ack, The volumeBots are used to
with DOS A ack tools. a ack at the same me.
DOS A acks are Easy to trace. DDOS A acks are Difficult to trace.
The size of ciphertext is the same or smaller The size of ciphertext is the same or larger
than the original plaintext. than the original plaintext.
The length of key used is 128 or 256 bits The length of key used is 2048 or higher
It is efficient as it is used for handling large It is compara vely less efficient as it can
amount of data. handle a small amount of data.
3. Byte-Oriented. Bit-Oriented.
The selec on process for this is secret but The selec on process for this is
8. accepted for open public comment. secret.
AES cipher is derived from an aside-channel DES cipher is derived from Lucifer
13. square cipher. cipher.
Response
Response me is slow Fast response me
Time
In subs tu on Cipher Technique, The While in transposi on Cipher Technique, The Keys
le er with low frequency can detect which are nearer to correct key can disclose plain
plain text. text.
The example of subs tu on Cipher is The example of transposi on Cipher is Rail Fence
Caesar Cipher, monoalphabe c cipher, Cipher, columnar transposi on cipher, and route
and polyalphabe c cipher. cipher.
The frequency distribu on of the The frequency distribu on of the plaintext le ers
plaintext le ers is typically obscured, remains the same, but the order is scrambled,
but pa erns can s ll be detected with making it difficult to detect pa erns with sta s cal
sta s cal analysis. analysis.
DES AES
Cryptographic Low High
Strength
Key Size 56-Bit 128,192 and 256
bit
Block Size 64- Bit 128-Bit
Rounds 16 10,12,14-based on
key size
Usage Obsolete-Not used Currently used
industry standard