xor data hiding?
J. Michael Diehl
mdiehl at triton.unm.edu
Wed Jul 14 22:36:32 PDT 1993
According to Perry E. Metzger:
> J. Michael Diehl <mdiehl at triton.unm.edu> says:
> > According to Douglas Sinclair:
> > The point wasn't to be unbreakably secure; it was to be UNFINDABLY
> > secure. We convolute an allready encrypted message to the point of
> > not being recognizable as cyphertext, then we hide it on the end of
> > a file. We want it to look like garbage.
>
> Cyphertext from any decent system ALREADY looks random. Whats the
> point of doing more to it?
Many encryption tools such as ripem, pgp, and dolphin can recognize their own
output...which indicates that there is a footprint to that particular
implimentation.
+-----------------------+-----------------------------+---------+
| J. Michael Diehl ;-) | I thought I was wrong once. | PGP KEY |
| mdiehl at triton.unm.edu | But, I was mistaken. |available|
| mike.diehl at fido.org | | Ask Me! |
| (505) 299-2282 +-----------------------------+---------+
| |
+------"I'm just looking for the opportunity to be -------------+
| Politically Incorrect!" <Me> |
+-----If codes are outlawed, only criminals wil have codes.-----+
+----Is Big Brother in your phone? If you don't know, ask me---+
More information about the Testlist
mailing list