[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Hidden encrypted messages



Derek Zahn says:
> ....................I've gotten a number of responses
> of the form "Why not just claim that an encrypted message is data?",
> but my original point was Plausible Deniability.  That is, I was
> postulating an environment in which Big Brother has outlawed cryptography.
> Now, confronted with a confiscated message, the sender has to defend
> himself from the Inquisition.  Can't just claim it's a sound file;
> the Inquisitor will want it played.  The question I'm trying to answer
> is how to produce on demand a causal explanation of data (which actually
> contains an encrypted message) that satisfies an investigator and
> doesn't reveal the encrypted message.  Some simple scheme like, "Uh,
> it's the result of my new random number generation algorithm" isn't
> likely to be *satisfying* and is certain to produce the response,
> "OK, let's see the algorithm."

Yes, a very valid point.  But it seems to me, that Random Data
claim is the best, with the highest chances to keep one out of
trouble (if anything can :-).

The algorithm? Oh, sorry, but it's a HARDWARE random data generator!
And if it's truly good random gen, there are no patterns to track...
One can use it to create huge one-time pads, BTW...   "Salt" some of
the encrypted (or plaintext :-) messages with those...

The only thing to be concerned of - the cipher [to be claimed a
random data] shouldn't be crackable, and SHOULDN'T have any
patterns! Or they could present an evidence, that the
data isn't a product of your random gen...
--
Regards,
Uri         [email protected]      scifi!angmar!uri 	N2RIU
-----------
<Disclamer>


From cypherpunks-request  Thu Mar 11 12:44:24 1993