⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 15311

📁 神经网络昆斯林的新闻组分类2006
💻
字号:
Newsgroups: sci.cryptPath: cantaloupe.srv.cs.cmu.edu!rochester!udel!darwin.sura.net!newsserver.jvnc.net!howland.reston.ans.net!noc.near.net!lynx!mkagalenFrom: mkagalen@lynx.dac.northeastern.edu (michael kagalenko)Subject: Re: How to detect use of an illegal cipher?Message-ID: <1993Apr18.023759.5188@lynx.dac.northeastern.edu>Organization: Northeastern University, Boston, MA. 02115, USAReferences: <1qnmnp$db8@sol.TIS.COM> <1993Apr17.085358.18460@clarinet.com> <C5nMB1.CoF@news.claremont.edu>Date: Sun, 18 Apr 1993 02:37:59 GMTLines: 19In article <C5nMB1.CoF@news.claremont.edu> ebrandt@jarthur.claremont.edu (Eli Brandt) writes:>>I probably shouldn't say this, but they could try to detect the use>of an illegal cypher by transmitting in the clear some statistical>properties of the plaintext.  An old-fashioned wiretap could then>detect the use of pre-encryption, which would drastically increase>the measured entropy of the input.  A countermeasure to this would>be to use steganographic techniques which put out voice.This way to detect pre-encryption may be defeated ; one can do  transformation of the spectrum of encrypted signal just by adding some pre-arranged (in the beginning of communication) function.I think so. Say, you can do FFT of your encrypted signal.Just thinking ... -- --------------------------------------------------------------------------------      For PGP2.1 public key finger mkagalen@lynx.dac.northeastern.edu--------------------------------------------------------------------------------

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -