[17273] in cryptography@c2.net mail archive
RE: Papers about "Algorithm hiding" ?
daemon@ATHENA.MIT.EDU (Scott Guthery)
Tue May 31 11:56:03 2005
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Mon, 30 May 2005 21:11:11 -0400
From: "Scott Guthery" <sguthery@mobile-mind.com>
To: "Hadmut Danisch" <hadmut@danisch.de>, <cryptography@metzdowd.com>
Isn't this what Rivest's "Chaffing and Winnowing" is all about?
http://theory.lcs.mit.edu/~rivest/chaffing.txt
Cheers, Scott
-----Original Message-----
From: owner-cryptography@metzdowd.com
[mailto:owner-cryptography@metzdowd.com] On Behalf Of Hadmut Danisch
Sent: Thursday, May 26, 2005 5:51 PM
To: cryptography@metzdowd.com
Subject: Papers about "Algorithm hiding" ?
Hi,
you most probably have heard about the court case where the presence of
encryption software on a computer was viewed as evidence of criminal
intent.
http://www.lawlibrary.state.mn.us/archive/ctappub/0505/opa040381-0503.ht
m
http://news.com.com/Minnesota+court+takes+dim+view+of+encryption/2100-10
30_3-5718978.html
Plenty of research has been done about information hiding.
But this special court case requires "algorithm hiding" as a kind of
response. Do you know where to look for papers about this subject?
What about designing an algorithm good for encryption which someone can
not prove to be an encryption algorithm?
regards
Hadmut
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to
majordomo@metzdowd.com
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com