1996-03-02 - Is there any work on entropy-lowering schemes?

Header Data

From: Mutant Rob <wlkngowl@unix.asb.com>
To: cypherpunks@toad.com
Message Hash: c96e2f1945c9ce2c3e2764199166e68f1a432ba08518e1c1d01c8decf69daf7d
Message ID: <199603020046.TAA08670@bb.hks.net>
Reply To: N/A
UTC Datetime: 1996-03-02 14:28:17 UTC
Raw Date: Sat, 2 Mar 1996 22:28:17 +0800

Raw message

From: Mutant Rob <wlkngowl@unix.asb.com>
Date: Sat, 2 Mar 1996 22:28:17 +0800
To: cypherpunks@toad.com
Subject: Is there any work on entropy-lowering schemes?
Message-ID: <199603020046.TAA08670@bb.hks.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

I'm wondering if anyone has done any work on schemes to lower the
entropy of a given stream.  Why?  Save you've got message M encrypted
with a good cipher, but you're worried that it can be detected because
even with stego, the entropy is a lot higher than normal 'random' data
flowing through a network.

So it seems possible to create a scheme that given a key will take a
block of n bits and expand it to 1.5n or 2n bits, recoding it in such
a way that determining the key is difficult even if one suspects such
a scheme has been used... but that using the scheme will make the data
look more like the MSBs of graphical data rather than encrypted data.


Rob
- ---
[This message has been signed by an auto-signing service.  A valid signature
means only that it has been received at the address corresponding to the
signature and forwarded.]

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
Comment: Gratis auto-signing service

iQBFAwUBMTeaeioZzwIn1bdtAQGNagF/cmAH45G1v1Yt1Bg+7qgZVVnIYdj9EfzV
rqzPx7MRyGbVW4HtNWkYjiPxgn2iUQaH
=t114
-----END PGP SIGNATURE-----





Thread