1. Introduction to Obfuscation
Obfuscation is the process of making information more difficult to understand. The original data can be recovered if the obfuscation method is known. It hides information in plain sight, making it difficult to recognize without the key.
2. Steganography
Definition: The practice of hiding information within various media.
Origins: The term comes from Greek, meaning “concealed writing.”
Methods:
- Image Steganography: Data is embedded within an image.
- Network Traffic Steganography: Messages are hidden within TCP packets.
- Printed Document Steganography: Invisible yellow dots (Machine Identification Codes) are embedded by printers.
- Audio & Video Steganography: Data is embedded within audio or video files.
Security Considerations: Often classified as "security through obscurity," which is not considered true security since the data can be easily retrieved if the method is known.
3. Tokenization
Definition: Replacing sensitive data with a token that maps back to the original data.
Example:
- A Social Security number can be replaced with a random number.
- The actual data is stored separately and mapped when needed.
Application in Digital Payments:
- A credit card is registered on a mobile device, and a token is issued instead of the actual card number.
- The token is used for transactions and is one-time use only.
- The merchant sends the token to a Token Service Server, which retrieves the actual card number and validates the transaction.
- After use, the token is discarded, and a new one is generated for future transactions.
Security Advantage: Even if a token is intercepted, it cannot be reused.