[6692] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: hiding plaintext

daemon@ATHENA.MIT.EDU (Eric Murray)
Wed Mar 1 17:34:34 2000

Message-ID: <20000301095855.23927@slack.lne.com>
Date: Wed, 1 Mar 2000 09:58:55 -0800
From: Eric Murray <ericm@lne.com>
To: Russell Nelson <nelson@crynwr.com>
Cc: Cryptography <cryptography@c2.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
In-Reply-To: <14523.59590.40430.910966@desk.crynwr.com>; from Russell Nelson on Tue, Feb 29, 2000 at 11:14:31AM -0500

On Tue, Feb 29, 2000 at 11:14:31AM -0500, Russell Nelson wrote:
> One could increase the difficulty of decryption by three or four
> doublings by intermixing random data with plaintext in a message.
> Here's the least stupid method I can think of: the first character in
> a message is the start of text (SOT) character.  The second character
> in a message is the end of text (EOT) character.  The message itself
> consists of random data intermixed with plaintext prefixed by SOT and
> suffixed with EOT.  An EOT outside of plaintext stands for itself.  An
> SOT inside plaintext stands for itself.  This method can encode
> arbitrary plaintext.  By implication, the random data does not contain
> an SOT nor EOT.

I assume that you do this before encryption. 

Wouldn't compressing the plaintext before encryption have the same effect?

-- 
 Eric Murray www.lne.com/~ericm  ericm at the site lne.com  PGP keyid:E03F65E5


home help back first fref pref prev next nref lref last post