[6522] in cryptography@c2.net mail archive
Re: The problem with Steganography
daemon@ATHENA.MIT.EDU (Rick Smith)
Thu Jan 27 11:23:08 2000
Message-Id: <3.0.3.32.20000127101621.00bc49d0@mailhost.sctc.com>
Date: Thu, 27 Jan 2000 10:16:21 -0600
To: Ben Laurie <ben@algroup.co.uk>
From: Rick Smith <rick_smith@securecomputing.com>
Cc: cryptography@c2.net
In-Reply-To: <388F8D56.75C22FE9@algroup.co.uk>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
At 12:12 AM 01/27/2000 +0000, Ben Laurie wrote:
>I can't quite see the point of forward stego.
I'll leave it to Russ to explain his application if he wants to.
> Why not publish something
>public key encrypted and publish the private key later?
Symmetric cryptography has two advantages in this application: 1. it
requires fewer resources to implement and 2. there aren't any data
dependent vulnerabilities like there are with public key algorithms. It's
like encrypted e-mail: you use the symmetric key for the data and the
public key to encrypt the symmetric key. Since the symmetric key is secret
random data, it's less susceptable to attack.
Rick.
smith@securecomputing.com