But there is a problem. When you encode your information into the bible, you will modify it slightly and the differences encode your message. However, an ease dropper will recognize the writing as the bible. All they have to do is correctly guess the exact copy you used and do a diff to get an encoding of your message. The message may still be encrypted, but if this is in the right context, this is enough to provoke suspicion.
If you are going to transmit a large amount of data using stenography this way, you should use a large original data set that is not publicly available so that the ease dropper cannot get a copy of the original to compare it to.
Name:
Anonymous2012-10-20 3:58
>>41
You dont encode, you just pick matching page.
that too is an encoding. The page number is the encoded value and this value can be determined by indexing the pages of the bible and performing a look up.
As before, it isn't a big deal if the encoded values are encrypted. But if the encoding is noticeable then the stenography didn't work.
Name:
Anonymous2012-10-20 4:06
>>43
not a page number, but the content of the page (i.e. number of comas/whitespaces)
>>34 But encrypted data within steganography takes more analysis to detect.
Well, it would be pretty silly to use steganography not in conjunction with an encryption scheme. Now I think it should be possible to steganographically hide a public key encrypted message as long as there are no visible unencrypted headers (and that the public key structures have uniform distribution in all their bits, which I don't think holds for all ciphers although it might be possible to adapt for some). But yeah, for decryption, one would have to try every steg encoding scheme against every private key in storage.
Name:
Anonymous2012-10-21 1:10
>>41 ease dropper
I laughed so much I almost fell off my pedal stool.
Name:
Anonymous2012-10-21 6:36
"Haruhi-chan, have you read about public key cryptography?"
"Cryptography? Uh..."
Wait a minute. What does cryptography have to deal with Nagato? I thought you were her therapist and this would be more psychobabble. Just what is going on here?
"Secret messages? Encryption, internet security, does that give you a hint?"
"I uh eh..."
Asahina-san made a hand gesture calling Haruhi's attention. "Earth to Haruhi, Earth to Haruhi, do you read me, Haruhi?"
"Eh? Oh, sorry! It's just that this government business caught me off guard..."
Asahina-sensei chuckled. "It's understandable. Kyon-kun almost threw up the first time I met him and told him about me. So, Haruhi-chan, have you thought about the answer?"
"Uh, what was the question?"
"Public key cryptography."
"Hmmm let me see... I remember. It was about prime numbers."
"That's right. If you have two prime numbers, N1, and N2, by multiplying them you obtain a bigger number. If someone, let's say, Alice, wants to send a message to Bob, the only thing Bob needs to give Alice is the multiplied number N1*N2 = M, to encrypt her message. Bob can decrypt the message because he knows what N1 and N2 are."
Wait a minute... prime numbers, multiplying, what? I'm not very good at math, someone explain this to me.
"You seem confused, Kyon-kun. But I'll let Haruhi explain to you later. Or... you could look it up in Google."
Haruhi stared at me with an annoyed look. What? I'm still studying in High school, how was I supposed to know that?
"Anyway, if Alice wanted to obtain N1 and N2 from M to decrypt a message sent to Bob, she would need to run a supercomputer for years trying to guess what N1 and N2 are. So that's the basis for public key cryptography."
Haruhi nodded quickly, while I was just following her. Asahina-sensei continued with her speech.
"Do you know what would happen if somehow, this powerful encryption could be broken with a super-incredible computer?"
"Yes..." said Haruhi, holding her chin. "It would mean... that, all the internet would..."
Asahina-sensei finished explaining. "Nothing would be secure anymore. Private conversations, financial transactions, intelligence secrets, confidential documents, nothing would be safe. Nothing. Now, you must be wondering what this has to do with Nagato-san, right?"
>>53
Everybody sing along now... The S&M man,
The S&M man,
The S&M man because he mixes it with love,
And makes the hurtin’ feel good.
The hurtin’ feel good.
Name:
Anonymous2012-10-21 19:50
New /prog/ challenge: write a secure and undetectable public key steganography system in less than 1000 lines in your favourite language. You are allowed to use OpenSSL.