From: Jeremy Cooper <jeremy@crl.com>
To: Sergey Goldgaber <sergey@delbruck.pharm.sunysb.edu>
Message Hash: 212681b5fd47db8f95f51d9c8ebc2e33dc2c4fb916569aad3e9af8b6e6a02f0f
Message ID: <Pine.3.87.9402282231.A8890-0100000@crl.crl.com>
Reply To: <Pine.3.89.9402281853.A11533-0100000@delbruck.pharm.sunysb.edu>
UTC Datetime: 1994-03-01 06:38:25 UTC
Raw Date: Mon, 28 Feb 94 22:38:25 PST
From: Jeremy Cooper <jeremy@crl.com>
Date: Mon, 28 Feb 94 22:38:25 PST
To: Sergey Goldgaber <sergey@delbruck.pharm.sunysb.edu>
Subject: Re: standard for stegonography?
In-Reply-To: <Pine.3.89.9402281853.A11533-0100000@delbruck.pharm.sunysb.edu>
Message-ID: <Pine.3.87.9402282231.A8890-0100000@crl.crl.com>
MIME-Version: 1.0
Content-Type: text/plain
>
> "Pseudo-Stego" can be relatively secure as long as a large number of
> different hiding schemes/standards are used by the public. An effective
> means of ensuring this would be to use the reciever's public-key
> checksum-value as the standard offset for stego. The large number of
> public-keys available make it rather infeasable for one's opponents to try
> them all. This, I believe, provides pretty adequate security (assuming one
> strips any telltale headers off the hidden file beforehand).
>
How many possible checksums are there? If you use a one byte checksum,
there are only 256 possible combinations right? Maybe what I am asking
is, 'How big is the checksum?'
_ . _ ___ _ . _
===-|)/\\/|V|/\/\ (_)/_\|_|\_/(_)/_\|_| Stop by for an excursion into the-===
===-|)||| | |\/\/ mud.crl.com 8888 (_) Virtual Bay Area! -===
Return to March 1994
Return to “tcmay@netcom.com (Timothy C. May)”