standard for stegonography?

Jeremy Cooper jeremy at crl.com
Mon Feb 28 22:38:25 PST 1994



> 
> "Pseudo-Stego" can be relatively secure as long as a large number of 
> different hiding schemes/standards are used by the public.  An effective 
> means of ensuring this would be to use the reciever's public-key 
> checksum-value as the standard offset for stego.  The large number of 
> public-keys available make it rather infeasable for one's opponents to try 
> them all.  This, I believe, provides pretty adequate security (assuming one 
> strips any telltale headers off the hidden file beforehand).
>

How many possible checksums are there?  If you use a one byte checksum, 
there are only 256 possible combinations right?  Maybe what I am asking 
is, 'How big is the checksum?' 
                   _  .  _ ___ _  .  _
===-|)/\\/|V|/\/\ (_)/_\|_|\_/(_)/_\|_| Stop by for an excursion into the-===
===-|)||| | |\/\/  mud.crl.com 8888 (_) Virtual Bay Area!                -===








More information about the cypherpunks-legacy mailing list