📄 15311
字号:
Newsgroups: sci.cryptPath: cantaloupe.srv.cs.cmu.edu!rochester!udel!darwin.sura.net!newsserver.jvnc.net!howland.reston.ans.net!noc.near.net!lynx!mkagalenFrom: mkagalen@lynx.dac.northeastern.edu (michael kagalenko)Subject: Re: How to detect use of an illegal cipher?Message-ID: <1993Apr18.023759.5188@lynx.dac.northeastern.edu>Organization: Northeastern University, Boston, MA. 02115, USAReferences: <1qnmnp$db8@sol.TIS.COM> <1993Apr17.085358.18460@clarinet.com> <C5nMB1.CoF@news.claremont.edu>Date: Sun, 18 Apr 1993 02:37:59 GMTLines: 19In article <C5nMB1.CoF@news.claremont.edu> ebrandt@jarthur.claremont.edu (Eli Brandt) writes:>>I probably shouldn't say this, but they could try to detect the use>of an illegal cypher by transmitting in the clear some statistical>properties of the plaintext. An old-fashioned wiretap could then>detect the use of pre-encryption, which would drastically increase>the measured entropy of the input. A countermeasure to this would>be to use steganographic techniques which put out voice.This way to detect pre-encryption may be defeated ; one can do transformation of the spectrum of encrypted signal just by adding some pre-arranged (in the beginning of communication) function.I think so. Say, you can do FFT of your encrypted signal.Just thinking ... -- -------------------------------------------------------------------------------- For PGP2.1 public key finger mkagalen@lynx.dac.northeastern.edu--------------------------------------------------------------------------------
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -