Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Cryptography [PART I]

Name: Cryptography 2012-10-16 22:36

Cryptography

Name: Anonymous 2012-11-02 23:25

>>128

We are responding to the same point. But it is perfectly possible for stenography to use a key. For instance, a scattered sequence of bits that weaves through a large collection of home photos some of which were deleted and partially overwritten with audio recordings. If the amount of encoded information is sufficiently low, how will you see the signal through the noise? Suppose they guess the exact algorithm that you used, any associated keys, and they extract the data. How will they know they have obtained the encrypted data instead of bits of random noise?

>>125
steganography is related in the it satisfies a related purpose.

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List