1996-03-10 - Re: steganographic trick

Header Data

From: “Vladimir Z. Nuri” <vznuri@netcom.com>
To: JonWienke@aol.com
Message Hash: 816f247f39189d1126984f81b25ea252394bda85a0ce2e44437efcf0e9b6a5f5
Message ID: <199603082130.NAA26560@netcom4.netcom.com>
Reply To: <960308040205_240667097@emout04.mail.aol.com>
UTC Datetime: 1996-03-10 16:41:11 UTC
Raw Date: Mon, 11 Mar 1996 00:41:11 +0800

Raw message

From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Mon, 11 Mar 1996 00:41:11 +0800
To: JonWienke@aol.com
Subject: Re: steganographic trick
In-Reply-To: <960308040205_240667097@emout04.mail.aol.com>
Message-ID: <199603082130.NAA26560@netcom4.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



>> given one key, it decrypts into one set of data, and given
>>another key, it decrypts into another set of data.
>
>The only computationally feasible way to accomplish this would be to use a
>variation of the one time pad (OTP) cipher, and use two keys:  the genuine
>key, which is made by the random number generator of your choice, and a
>specially cooked key generated by XORing the encrypted message with an
>innocuous message.  Decrypting with the random key will yield the real
>message, and decrypting with the cooked key will yield the innocuous message.
> The disadvantage to this system is that each key will be the same length as
>the message.

I don't agree that this is the only way to accomplish the problem I proposed.
I gave a scheme that is not equivalent to the one you state. you seem
not to address my actual technical description, although I admit it requires
a bit of inference on the part of the reader.

in the scheme I proposed, P1 and P2 are the two keys. an XOR or OTP
system has nothing to do with what I described.

one problem you do remind me of is that P1 and P2 are going to be
hard to "remember". of course the way PGP handles this is a pass
phrase that unlocks the encrypted key using the IDEA cipher. another
interesting approach would be to use a hash of the passphrase as
a random seed in the process to get the prime number. in other words,
the passphrase is the seed to the algorithm that hunts for the prime
number starting at some random location, and if fed the same seed
(the hash of the passphase) it will again find the same prime number....

>The method you propose (using multiple RSA keys) is not workable.  Finding 2
>RSA keys that will decrypt a given ciphertext block to any 2 meaningful
>plaintexts is at least as difficult as breaking RSA, and expanding this
>concept to messages longer than 1 block moves it into the realm of
>impossibility.

I believe you have misunderstood my description. I gave a feasible system.
I don't know precisely what you mean by "multiple RSA keys". my system
did not have any aspect of public key crypto to it. it is a single
key cipher.





Thread