1 Covert Cryptography and Steganography J M Blackledge Stokes Professor Dublin Institute of Technology http://eleceng.dit.ie/blackledge Distinguished Professor Warsaw University of Technology Thursday 21 st October, 2010: 14:00 -14:45 Contents of Presentation • Basic Concept in Cryptography • Principal Issues in Cryptography • The Kerchhoff-Shanon Principle • Covert Cryptography • Principles of Steganography • Stochastic Diffusion – StegoCrypt • e-Document Authentication – Demonstration • Other Applications – Texture Coding • Q & A
19
Embed
Covert Cryptography and Steganography - TU Dublin3 Multiple Encryption • Uses many locks or Keys Kn •Based on application of the same encryption/decryption algorithm E/D •Used
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
1
Covert Cryptography and Steganography
J M BlackledgeStokes Professor
Dublin Institute of Technologyhttp://eleceng.dit.ie/blackledge
Distinguished ProfessorWarsaw University of Technology
Thursday 21st October, 2010: 14:00 -14:45
Contents of Presentation
• Basic Concept in Cryptography• Principal Issues in Cryptography• The Kerchhoff-Shanon Principle• Covert Cryptography• Principles of Steganography• Stochastic Diffusion – StegoCrypt• e-Document Authentication – Demonstration• Other Applications – Texture Coding• Q & A
Iterative Cryptosystems• Most cryptographic systems are based on a series of
so-called round transformations, which are relatively simple and produce Pseudo Random Number StreamsPseudo Random Number Generators (PRNG)
• A PRNG is a function or an algorithm that produces a sequence of numbers from a relatively short seed (initial conditions: password, plaintext) based on some iteration function
Input Output
key
iterationfunction
N rounds
The mod Function• Modular based functions tend to behave more
erratically than conventional functions
• amod(b) gives the remainder of a/b, e.g.23mod(7) = 2; amod(b)=a-bfloor(a/b)
• Use of prime numbers helps to provide remainders
10
Example Algorithms for Computing
• Blum Blum Shub generatorwhere p and q are two prime numbers
• Blum Mercali generatorwhere q is a prime and p is an odd prime
‘A cryptosystem should be secure even if everything about the system, except the key, is public knowledge’
• Shannon’s Principle:‘The enemy knows the system’, i.e.
THE ALGORITHM
11
Curse of the Crib
CRYPTOSYSTEMinput
(plaintext)
output(ciphertext)
key
input(Crib)
CRYPTOSYSTEMoutput
comparator
Assumed+
Gardened
Some Golden Rules• Security is a process not a product
• Never underestimate the enemy
• The longer that any cryptosystem, or part thereof, remains of the same type and function, the more vulnerable the system becomes to a successful attack. This is inclusive of
THE ALGORITHM
• If you want to know what you are eating then grow it and cook it yourself, e.g. Enigma 1945++
12
Covert Cryptography
Attack ? Attack What ?F7&^%p£#29hGS Have a nice day
Why Should Encrypted Information be Transmitted Covertly ?
13
SteganographySteganography (Greek in origin) means
Watermark one letter (consisting of disinformationto be intercepted) with another (secret information)
• Plausible DeniabilityWatermark one letter (consisting of information of value to an attacker) with another (consisting ofsecrete information) and encrypt the result
• Cribb Camouflage
• Covert Key Exchange
17
Applications of Texture Coding 1:Identity Cards
Printed at 600dpi; scannedwith flat-bed scanner at 300dpi
Printed at 600dpi; scanned with mobile phone camera
Applications of Texture Coding 2:Signature Authentication
18
Applications of Texture Coding 3:Passport Authentication
Printed at 400dpi;
Scanned with flat-bed scanner at 300dpi
Applications of Texture Coding 4:Currency Authentication
Binary texture code printedusing UV ink at 150 dpi
Scanned with camera at at 300dpi under UV lamp
19
Applications of Texture Coding 5:Statistical Authentication
Texture code generated of basic statistics associated with a scan of a high value bank bond and printed on the back of the bond at 300dip; flat-bed scanned at 150dpi