Top Banner
1 Covert Cryptography and Steganography J M Blackledge Stokes Professor Dublin Institute of Technology http://eleceng.dit.ie/blackledge Distinguished Professor Warsaw University of Technology Thursday 21 st October, 2010: 14:00 -14:45 Contents of Presentation Basic Concept in Cryptography Principal Issues in Cryptography The Kerchhoff-Shanon Principle Covert Cryptography Principles of Steganography Stochastic Diffusion – StegoCrypt e-Document Authentication – Demonstration Other Applications – Texture Coding Q & A
19

Covert Cryptography and Steganography - TU Dublin3 Multiple Encryption • Uses many locks or Keys Kn •Based on application of the same encryption/decryption algorithm E/D •Used

Feb 27, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Covert Cryptography and Steganography - TU Dublin3 Multiple Encryption • Uses many locks or Keys Kn •Based on application of the same encryption/decryption algorithm E/D •Used

1

Covert Cryptography and Steganography

J M BlackledgeStokes Professor

Dublin Institute of Technologyhttp://eleceng.dit.ie/blackledge

Distinguished ProfessorWarsaw University of Technology

Thursday 21st October, 2010: 14:00 -14:45

Contents of Presentation

• Basic Concept in Cryptography• Principal Issues in Cryptography• The Kerchhoff-Shanon Principle• Covert Cryptography• Principles of Steganography• Stochastic Diffusion – StegoCrypt• e-Document Authentication – Demonstration• Other Applications – Texture Coding• Q & A

Page 2: Covert Cryptography and Steganography - TU Dublin3 Multiple Encryption • Uses many locks or Keys Kn •Based on application of the same encryption/decryption algorithm E/D •Used

2

Basic Concepts in Cryptography

• Box strength : strength of Encryptor E/D• Combination # : strength of Key K (length of #)

Symmetric Encryption

• A & B agree on combination # a priori

• A & B undertake thesame lock/unlock process – a symmetric process

• Vulnerable to attack if interceptor obtains combination # when A & B agree upon it

• Problem: How should A & B exchange the key?

Page 3: Covert Cryptography and Steganography - TU Dublin3 Multiple Encryption • Uses many locks or Keys Kn •Based on application of the same encryption/decryption algorithm E/D •Used

3

Multiple Encryption• Uses many locks or Keys Kn

• Based on application of the same encryption/decryption algorithm E/D

• Used to increase effective key length, e.g.Digital Encryption Standard 3 (DES3)

Asymmetric Encryption

• A sends B an open lock with combination knownonly to A.

• B secures box with lock &sends box (with message) back to A – an asymmetric process

• A is vulnerable to receiving disinformation if open lock is intercepted

• Problem: How can A authenticate the message from B?

Page 4: Covert Cryptography and Steganography - TU Dublin3 Multiple Encryption • Uses many locks or Keys Kn •Based on application of the same encryption/decryption algorithm E/D •Used

4

Three-Way-Pass Protocol

• A locks box with combination# known only to A and sendsit to B

• B locks box with another lockand a combination # known only to B and sends it back to A

• A (partially) unlocks box and sends it back to B

• B (completely) unlocks box to recover message

Protocol is vulnerable to 3-pass interception

Public/Private Key Encryption

• A locks box with a public combination # unique to B- a public key

• Some ‘property’ of this publickey is known only to B

• This ‘property’ (the private key) allows B to unlock the box

• Vulnerability of method depends on the ‘property’ which depends on the design details of the lock

Page 5: Covert Cryptography and Steganography - TU Dublin3 Multiple Encryption • Uses many locks or Keys Kn •Based on application of the same encryption/decryption algorithm E/D •Used

5

Principal Issues in Cryptography

• Cryptographic systems should be designed with respect to three components:- cyphertext generation- key exchange- authenticity

• Each component tends to rely on separate and distinct methods of approach

Vernam Cipher (1919)

• Substitution cipher based on generating an array of random integers to form a vector n

• Cipher is given by (vector addition)

• Number code used for p (and c) must be standardised, e.g. 7-bit ASCII code so that

Page 6: Covert Cryptography and Steganography - TU Dublin3 Multiple Encryption • Uses many locks or Keys Kn •Based on application of the same encryption/decryption algorithm E/D •Used

6

Example of a Vernam Cipher

Substitution (Stream) Ciphers

• Plaintext character substituted for randomly selected character generated by a cipher n

• Usually implemented using bit-wise operators; operating on binary strings, e.g.

Decimal space

Binary space

Page 7: Covert Cryptography and Steganography - TU Dublin3 Multiple Encryption • Uses many locks or Keys Kn •Based on application of the same encryption/decryption algorithm E/D •Used

7

Principal Conditions for |

• n - the cipher – is generated by some physical effect or computed using a numerical algorithm that can be seeded by a key K

• The algorithm should produce random numbers with no statistical bias – maximum confusion

• n should be ultra-sensitive to K :a change of 1 bit in K should potentially effect all the bits of n – maximum diffusion

• n must have a long cycle length

Diffusion + Confusion

Page 8: Covert Cryptography and Steganography - TU Dublin3 Multiple Encryption • Uses many locks or Keys Kn •Based on application of the same encryption/decryption algorithm E/D •Used

8

Examples of Cipher Generation I

• SIGSALLY (Green Hornet): AT & T (1942-46)

• Noise generated using a vacuum tubeand stored on a phonograph record

• Record used to mask 1-to-1voice signals

• Distribution of noise sources strictly controlled

• Records were in effect one-time-pads

Examples of Cipher Generation II

• HotBits

• Atmospheric radio noise http://www.random.org/

• Quantum Mechanical noise usinga reverse biased semiconductorjunction http://www.araneus.fi/

http://www.fourmilab.ch/hotbits/

Page 9: Covert Cryptography and Steganography - TU Dublin3 Multiple Encryption • Uses many locks or Keys Kn •Based on application of the same encryption/decryption algorithm E/D •Used

9

Iterative Cryptosystems• Most cryptographic systems are based on a series of

so-called round transformations, which are relatively simple and produce Pseudo Random Number StreamsPseudo Random Number Generators (PRNG)

• A PRNG is a function or an algorithm that produces a sequence of numbers from a relatively short seed (initial conditions: password, plaintext) based on some iteration function

Input Output

key

iterationfunction

N rounds

The mod Function• Modular based functions tend to behave more

erratically than conventional functions

• amod(b) gives the remainder of a/b, e.g.23mod(7) = 2; amod(b)=a-bfloor(a/b)

• Use of prime numbers helps to provide remainders

Page 10: Covert Cryptography and Steganography - TU Dublin3 Multiple Encryption • Uses many locks or Keys Kn •Based on application of the same encryption/decryption algorithm E/D •Used

10

Example Algorithms for Computing

• Blum Blum Shub generatorwhere p and q are two prime numbers

• Blum Mercali generatorwhere q is a prime and p is an odd prime

• RSA (Rivest, Shamir and Adleman) generator

where e is a relative prime of p-1 and q-1

Kerchhoff-Shannon Principle• Kerchhoff’s Principle:

‘A cryptosystem should be secure even if everything about the system, except the key, is public knowledge’

• Shannon’s Principle:‘The enemy knows the system’, i.e.

THE ALGORITHM

Page 11: Covert Cryptography and Steganography - TU Dublin3 Multiple Encryption • Uses many locks or Keys Kn •Based on application of the same encryption/decryption algorithm E/D •Used

11

Curse of the Crib

CRYPTOSYSTEMinput

(plaintext)

output(ciphertext)

key

input(Crib)

CRYPTOSYSTEMoutput

comparator

Assumed+

Gardened

Some Golden Rules• Security is a process not a product

• Never underestimate the enemy

• The longer that any cryptosystem, or part thereof, remains of the same type and function, the more vulnerable the system becomes to a successful attack. This is inclusive of

THE ALGORITHM

• If you want to know what you are eating then grow it and cook it yourself, e.g. Enigma 1945++

Page 12: Covert Cryptography and Steganography - TU Dublin3 Multiple Encryption • Uses many locks or Keys Kn •Based on application of the same encryption/decryption algorithm E/D •Used

12

Covert Cryptography

Attack ? Attack What ?F7&^%p£#29hGS Have a nice day

Why Should Encrypted Information be Transmitted Covertly ?

Page 13: Covert Cryptography and Steganography - TU Dublin3 Multiple Encryption • Uses many locks or Keys Kn •Based on application of the same encryption/decryption algorithm E/D •Used

13

SteganographySteganography (Greek in origin) means

Covered or Concealed Writing

Principles of Steganography

Page 14: Covert Cryptography and Steganography - TU Dublin3 Multiple Encryption • Uses many locks or Keys Kn •Based on application of the same encryption/decryption algorithm E/D •Used

14

Hiding Information in Digital Images

Information Host Image Retrieval

Basic Model

Stegotext = Ciphertext + Covertext

Ciphertext = Cipher diffused with Plaintext

Image of Ciphertext = Texture Code

• Ciphertext generated by process of Diffusion

• Stegotext generated by process of Confusion

Page 15: Covert Cryptography and Steganography - TU Dublin3 Multiple Encryption • Uses many locks or Keys Kn •Based on application of the same encryption/decryption algorithm E/D •Used

15

Stochastic Diffusion

StegoCrypthttp://eleceng.dit.ie/arg/downloads/StegoCrypt.zip

Page 16: Covert Cryptography and Steganography - TU Dublin3 Multiple Encryption • Uses many locks or Keys Kn •Based on application of the same encryption/decryption algorithm E/D •Used

16

Authentication of e-Certificates

Other Applications• Disinformation:

Watermark one letter (consisting of disinformationto be intercepted) with another (secret information)

• Plausible DeniabilityWatermark one letter (consisting of information of value to an attacker) with another (consisting ofsecrete information) and encrypt the result

• Cribb Camouflage

• Covert Key Exchange

Page 17: Covert Cryptography and Steganography - TU Dublin3 Multiple Encryption • Uses many locks or Keys Kn •Based on application of the same encryption/decryption algorithm E/D •Used

17

Applications of Texture Coding 1:Identity Cards

Printed at 600dpi; scannedwith flat-bed scanner at 300dpi

Printed at 600dpi; scanned with mobile phone camera

Applications of Texture Coding 2:Signature Authentication

Page 18: Covert Cryptography and Steganography - TU Dublin3 Multiple Encryption • Uses many locks or Keys Kn •Based on application of the same encryption/decryption algorithm E/D •Used

18

Applications of Texture Coding 3:Passport Authentication

Printed at 400dpi;

Scanned with flat-bed scanner at 300dpi

Applications of Texture Coding 4:Currency Authentication

Binary texture code printedusing UV ink at 150 dpi

Scanned with camera at at 300dpi under UV lamp

Page 19: Covert Cryptography and Steganography - TU Dublin3 Multiple Encryption • Uses many locks or Keys Kn •Based on application of the same encryption/decryption algorithm E/D •Used

19

Applications of Texture Coding 5:Statistical Authentication

Texture code generated of basic statistics associated with a scan of a high value bank bond and printed on the back of the bond at 300dip; flat-bed scanned at 150dpi

Q & A