[9476] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: "Pirate Utopia," FEED, February 20, 2001

daemon@ATHENA.MIT.EDU (David Honig)
Mon Sep 24 23:35:59 2001

Message-Id: <3.0.6.32.20010924171453.008f1750@pop.sprynet.com>
Date: Mon, 24 Sep 2001 17:14:53 -0700
To: Ray Dillinger <bear@sonic.net>, Nomen Nescio <nobody@dizum.com>
From: David Honig <honig@sprynet.com>
Cc: cryptography@wasabisystems.com
In-Reply-To: <Pine.LNX.4.21.0109241138120.6890-100000@bolt.sonic.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"

At 11:44 AM 9/24/01 -0700, Ray Dillinger wrote:
>
>Actually, dictionary attacks reveal about sixty percent of passwords, 
>so for every six passwords you find on a dictionary attack, you can 
>infer ten actual stegotexts times the ratio between your analyzed and 
>discovered (possibly-false) positives.  
>
>While he has analyzed only two percent of his sample, that's a sufficient 
>number that if even even a tenth of one percent of his positives were 
>real he'd have discovered at least a few passwords. 
>
>The paper is solid statistical methods; lack of any dictionary-yeilding 
>passwords in that big a sample is very strong evidence that the sample 
>is overwhelmingly made up of false positives.
>
>				Bear

That's an excellent point, but: if you were smart enough to use stego
for real, wouldn't you be smart enough to pick a good password? 





 






  







---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post