1996-03-07 - Re: art-stego

Header Data

From: Mutant Rob <wlkngowl@unix.asb.com>
To: cypherpunks@toad.com
Message Hash: e52f5d7e58120314bde3edf712ebb55e0c8c1f7794c27b8c0fd0197a21a17506
Message ID: <199603050914.EAA01262@bb.hks.net>
Reply To: N/A
UTC Datetime: 1996-03-07 11:18:10 UTC
Raw Date: Thu, 7 Mar 1996 19:18:10 +0800

Raw message

From: Mutant Rob <wlkngowl@unix.asb.com>
Date: Thu, 7 Mar 1996 19:18:10 +0800
To: cypherpunks@toad.com
Subject: Re: art-stego
Message-ID: <199603050914.EAA01262@bb.hks.net>
MIME-Version: 1.0
Content-Type: text/plain


JonWienke@aol.com wrote:
> Another thing--just a wild idea--test the randomness of encrypted data
> storing it in an 8-bit mono .WAV (your choice of sample rates) file and
> listening to it.  Any correlations or patterns in the data should show 
> the playback as hums, clicks, squeals, or something.  It may even be
> to determine the algorithm by the sound patterns--a sort of "audio
> cryptanalysis."  Has anyone tried this?  Are there any .WAV stego 
> out there?

s-tools is an audio stego utility(s), but I've not used it.

As for testing methods, noise spheres are an interesting graphical method
for testing randomness (check the archives from late Dec/early Jan, I
posted a short Turbo Pascal program that implements them).

I'm not entirely sure if noise spheres will capture any crypto-relevant
correlations, but it seems worth investigating.

The reference to the article on noise spheres and other graphical methods
for testing PRNGs is:

  Pickover, Clifford A. 1995. "Random number generators: pretty good
     ones are easy to find."  The Visual Computer (1995) 11:369-377.

- --Rob
- ---
[This message has been signed by an auto-signing service.  A valid signature
means only that it has been received at the address corresponding to the
signature and forwarded.]

Version: 2.6.2
Comment: Gratis auto-signing service