[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

steganography



In a previous message, which my VMS newsreader is too stupid to remember and
can just barely quote, an Evil Genius For A Better Tomorrow, [email protected],

says he thinks that xor'ing 'x' over a message would help to hide the fact that
it is cyphertext.
Problem: If someone is looking for encrypted information, IDEALLY we would like
steganographically for it to be unconditionally impossible to determine that a
file is cyphertext w/o the key.  (It is of course only computationally
infeasible to guess the key, if we pick our cryptosystem right.)

The suggestions that the Evil Genius makes could easily be defeated with an hour
or two of programming using pieces of PGP's source, or ripem, or a little piece
of software designed to tell whether a file is Dolphin Encrypted or Mailsafed.
The resulting program could check hundreds of database files easily, probably
in almost exactly the time required for an open, a single disk access, and a
close on each file.

For a steganographically strong code, the cyphertext must not be recognizable
to its home program.  This means, among other things, no CRC's, no MD5's, etc,
intended to assure data integrity.  This means no delimiter-structured files.
(I think--I'm not absolutely sure on this one.)  Every field in the file must
be either fixed-length or have a number somewhere in it
(in a format indistinguishable from the rest of the cyphertext) which tells its
length.  And every field, individually, must not be recognizable as something
unusual. (For instance, no sending of large prime numbers in the clear, as they
are very unlikely to appear in a random file.)

The foregoing "field" stuff has to do with things like PGP, which have a
message cyphertext, encrypted with a session key, and a session key, encrypted
with a PKC, in the same message. (Possible several cyphertexts of the session
key.)

Oh, and it would be nice, though not essential, if a corruption in the file
made it completely, rather than partially, nonsense when decrypted.  This way
you can't have a file with no use to the recipient used as evidence against
them.

The important qualifications seem to rule out any crypto package in current
widespread use, don't they?

Kragen, an ignorant crypto-wannabe