1995-10-14 - Re: responce to graphic encryption replies

Header Data

From: jps@monad.semcor.com (Jack P. Starrantino)
To: cypherpunks@toad.com
Message Hash: a8a7a87f217b5a74b8576c5b937e47358f6c51ad32dd8a228a71ea2072c47d96
Message ID: <9510140243.AA06608@monad.semcor.com>
Reply To: N/A
UTC Datetime: 1995-10-14 02:40:12 UTC
Raw Date: Fri, 13 Oct 95 19:40:12 PDT

Raw message

From: jps@monad.semcor.com (Jack P. Starrantino)
Date: Fri, 13 Oct 95 19:40:12 PDT
To: cypherpunks@toad.com
Subject: Re: responce to graphic encryption replies
Message-ID: <9510140243.AA06608@monad.semcor.com>
MIME-Version: 1.0
Content-Type: text/plain


> ... The graphic file is going to have a highly correlated 
> structure, long runs of white space etc. 

This is not the case for digital imagery. For any given band, if you
sample a significant portion of the image it would not be surprising to
see a more or less random distribution over the range.

> The statistics for such a file 
> would be different than the random distribution you'd get from using the 
> wrong key. 

If you decrypt with the wrong key, do you get a random distribution?
Would this be the case for all wrong keys? Would the statistics change
in any discernible pattern as the keys got "closer"?

> Even if the graphics format is compressed, leading to a more 
> even distribution, ...

This may give a better result. Most compressions involve a shift to the
frequency domain with a quantization of the samples. You might be able
to write a detector based on this discontinuity.

You could also try throwing an edge detector or some other morphological
recognizer at the output. It would still be cheaper than having to a man
in the loop, but you're going to spend a lot of cpu time.

jps
-- 
Jack P. Starrantino     (215) 674-0200 (voice)
SEMCOR, Inc.            (215) 443-0474 (fax)
65 West Street Road     jps@semcor.com
Suite C-100
Warminster, PA 18974




Thread