[5033] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Eason/Kawaguchi stego

daemon@ATHENA.MIT.EDU (Mike Stay)
Tue Jun 29 18:38:14 1999

Date: Tue, 29 Jun 1999 14:46:20 -0600
From: Mike Stay <staym@accessdata.com>
To: Russell Nelson <nelson@crynwr.com>
Cc: cryptography@c2.net

Russell Nelson wrote:
>You can't just take the output of one of those crypto systems and stuff 
>it into the "random" bits of a real-life sample.  There's too much 
>plaintext for the stego to hide. Stego needs a special type of 
>cryptography that has no known plaintext in its encrypted output -- 
>where the output of the stego algorithm is just as white as the white 
>noise it replaces

You could take a cue from S-tools; it uses the cipher you choose as a
prng to reorder the data.  S-tools seeds the prng with a password+salt,
but you could encrypt the seed w/ the public key, put it at the start, 
recover that with your private key, seed the generator, and extract the
pgp message.  That way, there's known plaintext, but you don't know
where to look for it.
-- 
Mike Stay
Cryptographer / Programmer
AccessData Corp.
mailto:staym@accessdata.com


home help back first fref pref prev next nref lref last post