Studio Gri Fare Logo
-- epic emigration to Cyberland

List of Technologies   About Armagan Tekdoner

The Intended Audience Targeted Only

Using DES, "Welcome" is encrypted and salted by the word "Visitor" as below:
vi1sjDttzXgXI

Web Security - Steganography, Cryptography, Ciphers, Encryptions, Hashing and more

Steganography

Concealed writing, (the idea of hiding the existence of a message) dates back to 440 BC.

Examples Instructions

Steganography example 1:
Zero-pixel same-background-colour font trick

Hello John Doe!
another hidden message perhaps something like 'Viens à l'hotel à minuit comme d'habitude tu ne peux pas savoir comme j'ai envie de toi, comme j'ai envie que tu me prennes là, tout de suite.'How are you today?
  • Select the 2 lines of text "Hello John Doe! How are you today?"
  • Copy what you selected.
  • Paste it on a TEXT EDITOR of your choice (such as notepad) to read the message

Steganography example 2:
Misleading file extension trick

The smiley below has an embedded message.

An image with a hidden text in the file
  • Right click on it
  • "Save Picture As..." whatever name you want
  • Save the file wherever you want
  • Find the file you just saved and right click on it. "Open with" any TEXT EDITOR of your choice (such as notepad)
  • Read the bottom line

Steganography example 3:
Changing the file extension trick
Requires good user skills, do you have Notepad++ or a similar editor installed?

The following link is to a 3-second audio file. It says "Hello John Doe" when played. Please click on it to hear it for yourself.
(If the browser prompts save or open, you can first save it as well.)

  • If not saved yet, "Save Link/target As..." whatever name you want
  • Save the file wherever you want
  • Find the file you just saved and right click on it. "Open with" an ADVANCED TEXT EDITOR (such as Notepad++)
  • Find the line that says "ATTENTION! SELECT and DELETE ALL YOU SEE ABOVE ALONG WITH THIS PHRASE AND SAVE THE FILE WITHOUT CHANGING ITS EXTENSION! LEAVE NO BLANK SPOTS AT THE TOP AFTER DELETION. DELETE UNTIL HERE" somewhere towards the end, at 213th line
  • Do exactly as it says, leave no blank line at the top
  • Save the file and close the editor. Single click on file's name and change the extension .mp3 to .jpg
  • Double click to open the file normally, to discover the real message

Cryptography

Secret writing, (the idea of hiding the meaning of a message) dates back to 19th century BC.

The trick is simple substitution. The catch is that when you do not know what to substitute with what, deciphering the message can become a real challenge. For eg. it would be very easy to see "12334" meant "HELLO", if only you knew 1 was H, 2 was E, 3 was L, and 4 was O. That is called "key". If you do not have the key, guessing the meaning of 12334 could be difficult, especially when the "text" is short. Contrarily, when there is a long essay to decipher, the human eye can easily see patterns and substitutions.

However, it is not that easy today. The demo below gives an idea.

Encryptions



  
The User Name you entered is:
The password you entered is:
MD5 encrypts as: d41d8cd98f00b204e9800998ecf8427e
MD5 encrypts as: d41d8cd98f00b204e9800998ecf8427e
SHA1 encrypts as: da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA512 encrypts as:
cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
DES encrypts AND salts as: viWP8XRMZw0lI
DES encrypts AND salts as: gu5LDMa2Yo.JA


To see how data are saved in databases after being encrypted by different algorithms, just enter any character then hit the submit button.
Nothing is stored or sent to anywhere, this is just a demo.