[6692] in cryptography@c2.net mail archive
Re: hiding plaintext
daemon@ATHENA.MIT.EDU (Eric Murray)
Wed Mar 1 17:34:34 2000
Message-ID: <20000301095855.23927@slack.lne.com>
Date: Wed, 1 Mar 2000 09:58:55 -0800
From: Eric Murray <ericm@lne.com>
To: Russell Nelson <nelson@crynwr.com>
Cc: Cryptography <cryptography@c2.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
In-Reply-To: <14523.59590.40430.910966@desk.crynwr.com>; from Russell Nelson on Tue, Feb 29, 2000 at 11:14:31AM -0500
On Tue, Feb 29, 2000 at 11:14:31AM -0500, Russell Nelson wrote:
> One could increase the difficulty of decryption by three or four
> doublings by intermixing random data with plaintext in a message.
> Here's the least stupid method I can think of: the first character in
> a message is the start of text (SOT) character. The second character
> in a message is the end of text (EOT) character. The message itself
> consists of random data intermixed with plaintext prefixed by SOT and
> suffixed with EOT. An EOT outside of plaintext stands for itself. An
> SOT inside plaintext stands for itself. This method can encode
> arbitrary plaintext. By implication, the random data does not contain
> an SOT nor EOT.
I assume that you do this before encryption.
Wouldn't compressing the plaintext before encryption have the same effect?
--
Eric Murray www.lne.com/~ericm ericm at the site lne.com PGP keyid:E03F65E5