[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: OTP dual decryption
>
> Hmm? I don't understand this problem. There's only one set of
> cyphertext.. the actual cyphertext. Do you mean "different batch of
> cyphertext" as the OTP which creates the innocuous plaintext from the
> cyphertext? Maybe encrypt the OTP w/DES and keep it on your hard drive.
> When "they" snag the drive, they see the different cyphertext, you tell
> them that it's the OTP you used and give them the DES-key to decrypt the
> innocuous OTP.
> I sense a problem with histogram equalization, however. Is there a
> problem here or does OTP-encryption take care of that?
With a OTP any plaintext can correspond with any cyphertext
given:
PAD (+) plaintext = cyphertext
meaning
PAD (+) cyphertext = plaintext
and
plaintext (+) cyphertext = PAD
so, take your output of DES, xor its contents with
desired "false plaintext" this is your false pad.
store this on a seperate disk and make it look
all secret-like.
When feds come and take your cyphertext (which is output
of DES) they ask for your key. You hand over your
disk with (fake) PAD. They xor the two together to
get (fake) plaintext which reads.
You dont have to do this before hand either, if you
have a copy of your cyphertext after the feds
confiscate a copy from you you can generate pad
to make it say something that will really freak them
out, like something you couldnt have known prior
to the seizure of the cyphertext :
"I will be illegally raided on July 2, 1994, sounds
sort of like '1984' to me. I wish the government
would stay out of my life"
> | Sameer [email protected] related mail to [email protected] |
peace.