[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

One-Time Pads as Attack Method




1. Agents of the Enemy wish to create the appearance of you possessing
document A.
2. They obtain some artifact you have emailed, or posted, or possess on
your private local storage. ---
Possibly even signed.  Call this message B.
3. They create the XOR of A and B, the result being a 'one time pad' C.
which of course, gives:
private message B XOR C = target bogus message A.  This result is of course
not a one time pad;
the plan is to accuse you of possessing materials that prove you are
trading with the enemy,
exchanging kiddie-porn, any of the usual things.
4. This 'one time pad' file C. somehow finds its way into your possession:
it is an email attachment,
embedded in some binary --- it could even be stego'ed into a GIF/JPG.
5. The agents break down the door and seize all your effects.  
6. They are able to prove that you possess B and C, the XOR of which is A.,
a fact that is impossible
to have happened at random.
7. The jury doesn't know shit, and figures that if the chances of B ^ C = A
by accident are 0,
then you must be guilty.

I'm only looking at the general schema of an attack like this: I'm sure
there are many ways
the right defense could be mounted about how the files got on the client's
computer, etc.etc.

The interesting part of this frame-job is using something you may have
already publicly posted,
making denial of its origin difficult, together with a surreptitious
planting of the 'pad' data.

Naturally the incriminating data payload could be delivered directly,
without the OTP business.
But I thought it might be worth examining the implications of this theme.