Skip main navigation

Options for Data Encryption

In this video, you will learn some options for data encryption.

This example covers encrypted files using Deep Sound.
6.3
Now in this video here, we have DeepSound. It’s a Windows steganography program. They can hide any type of file that you want, based on the size of the audio file. Now on the top screen here, I have a music file here. And on the bottom file here, I have the same music file that I encrypted with DeepSound. And this bottom one has a text file hidden in there. Now if you see the two files, they’re pretty much identical in the WAV format. If you’re pretty good at being able to tell wide WAV format or know exactly how the audio file should look, then you could probably tell little minute differences.
44.8
For me, unless I look really carefully, I really can’t tell the difference between them. And if you play the audio file, the file will sound the same between the two files. So I could actually take the file that has the hidden file in there and play it. And it’s going to sound just like the actual regular audio file. So that’s part of the power of DeepSound. So if a hacker finds the file, all they’re going to find is an audio file they’ve thrown into, something like Audacity like I have here. It’s going to still look like just an audio file.
83
So that’s going to help you protect your files, and also help obfuscate that you actually have information that may be of interest or is critical that a malicious person is going to want. So this is part of the data encryption. Now let’s take a look at the steganography program, DeepSound. Now again, this is going to be a Windows program. And it’s pretty simple. So once you have your file, you go over to Open Carrier File. And right there, I have my audio file of John Williams’ Imperial March– from The Empire Strikes Back– and it is 34.7 megs in size. Now again, that’s going to dictate how large of a file I could put in there.
123.5
Now if you look in the bottom section here, with that 34.7 megs, I could hide approximately a 8.7 meg file in there. And it can be anything I want. And then we can change the audio quality from low, normal, or high, depending on what you want. Now simply click Add Secret. And then we could choose whatever we want. In this case, it’s going to be a text file. And then we’re going to go to Encode Secret File. Here, we can encrypt with AES 256. So even if they do know it’s a steganography program, we could have a good password there and encrypt it. So there’s going to be extra layers of security.
164.4
Once you’re done, you simply click in Code Secret Files. And then you can grab your output file for the program. So all in all, pretty easy to use. And again, this is going to be DeepSound. It’s going to help us take an audio file, hide whatever we want in there, again it could be a text file, it could be a program, photo, whatever you want. And the size is going to be dictated by the original audio file. And again, if you pull it up in something like Audacity, the WAV formats are essentially really not going to change very much.
200.1
It may change a little bit, depending on what audio format you have, how big of a file you put it in, but all in all, you would have to have a pretty good eye to be able to tell. Also, if you listen to the file, even the file that you’re hiding your text file, your photo, or whatnot in there, it’s going to sound just like the original file. So again, this is part of the power of DeepSound. Now the other program we’re going to take a look at is VeraCrypt. Now VeraCrypt is an open source program available for Windows, OS X, Linux, and also there’s a USB version of it.
234.8
And essentially what VeraCrypt does is it creates an encrypted volume on your computer. Now simply select the volume you want, click on Create Volume, and then you can choose Encrypt File Container, Non-system Partition Drive, or Encrypt the Entire Drive. We’re going to do Encrypt File Container. And then we’re going to create just a simple container as an example here. So you click on that, you click Next. You could do a standard or you could do a hidden volume. We’re going to do a standard volume. And you click Next. And then you select the volume location by clicking on Select File. And then you can choose a folder. So we’re going to put it in the Super Secret Folder.
281.2
We’re going to open it. And then you want to just create a folder within there. We’re going to call it “encrypted,” and click Save. OK, then you want to click Next. And then you could choose a type of encryption– AES, Serpent Twofish, Camellia, AES, Twofish Serpent, et cetera, et cetera. So once you select which one you want, in this case, we’re going to be using, think we’re going to be using AES here. OK, you can select the hash algorithm, SHA-512 is by default. You can do Whirlpool’s SHA-256 or Street Mog. I would recommend SHA-512, unless you have a good reason to choose a different hash algorithm. So go and select which one you want and click Next.
332.1
And once you have that, you can also test it or benchmark it. Once you have it, you select how loud your volume is. Kilobytes, megabyte, gigabyte, or terabyte, depending how big your container is and what you need it for that particular encrypted volume. So we’re just going to make it a one megabyte file because we’re just doing this test. And then you choose your password. Going to enter a password, make sure it’s a good password. And if you put a pretty poor password in, it will complain to you about it. So I put a simple password because this is a demo. So you see I do have a warning here. I have a short password.
371.4
It recommend using 20 characters or more. If you want to ignore that, you can simply click Yes. And then it recommends moving the mouse at random. Mouse movement is to help with the encryption. So we’re going to go ahead and do that.
392.4
Once you’re done, you’ll want to click Format.
398.2
And we’re just going to move it a little bit more. And then we’re going to go ahead and format that particular folder, and our volume is, says we create it. OK, so once that’s done– we can cancel that– relaunch VeraCrypt. And then we can see our encrypted folder there, our one megabyte encrypted folder. So if you click on it, it doesn’t know how to open it. So go into VeraCrypt and then you want to go ahead and select File. You want to go ahead and go to your encrypted folder that you just created.
437.1
Then you want to go ahead and mount that folder.
441.7
And then enter your hopefully really good password. And click OK.
449.3
Now, depending on what the encryption is, how long your password is, how large the volume is, it’s going to depend on how long it takes to get in there. So once it mounts it, you can double click it and then you can send your encrypted folder. So pretty easy. And again, this is an extra layer of protection. You could take, even though I encrypted this to my computer, I can take that file, I can thrown in a USB drive, I could throw it on a cloud drive. And if a hacker tries to get in there, they’re going to be dealing with the encrypted folder. So it’s going to be a lot harder to get to.
481.4
Now wrapping up, cloud as a target. Cloud storage is a very appealing target for malicious hackers. We tend to keep a lot of good information in there. Good password management is important with cloud storage. So even with encryption, always use a good password and good password habits. Encrypting your cloud storage is yet another layer of security for you. So this was about encrypting your cloud storage. In the next video, we’re going to be going over everything you need to know about two-factor authentication. Thank you for watching. I’ll see you in the next video.
This article is from the free online

Cyber Security Foundations: Why Cyber Security is Important

Created by
FutureLearn - Learning For Life

Our purpose is to transform access to education.

We offer a diverse selection of courses from leading universities and cultural institutions from around the world. These are delivered one step at a time, and are accessible on mobile, tablet and desktop, so you can fit learning around your life.

We believe learning should be an enjoyable, social experience, so our courses offer the opportunity to discuss what you’re learning with others as you go, helping you make fresh discoveries and form new ideas.
You can unlock new opportunities with unlimited access to hundreds of online short courses for a year by subscribing to our Unlimited package. Build your knowledge with top universities and organisations.

Learn more about how FutureLearn is transforming access to education