[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Compress before encrypting? (Was Re: NSA Helped Yeltsin...)
Jay Prime Positive writes:
>[...]
>If you suspect that some of the non DOD/NSA cyphers might be broken,
>but you are not ready to employ one-time-pads, then you should
>threshold you mesages into N parts so that all N are needed to recover
>the original. Then encrypt each part under a different cypher.
>
>Perhaps IDEA, and 3DES would be apropriate. This will not increase
>the size of your messages very much since you compress before
>encrypting -- don't you?
Most compression programs add a characteristic signature to the beginning
of the compressed output file. If a cryptanalyst guesses that you may
be compressing before encrypting, wouldn't this make his job easier?
To me, this sounds as though you're adding a known bit of "plaintext" to
the start of each message.
If you're encrypting files that you wish to store securely you could just
clip off the signature, I suppose. But this would be unsuitable for sending
messages, because your compression program is now incompatible with everyone
else's.
Or am I missing something?
--
Martin Janzen [email protected]