Distinguishing Encrypted Data From Random Data?
gust5av writes “I’m working on a little script to provide very simple and easy to use steganography. I’m using bash together with cryptsetup (without LUKS) and the plausible deniability lies in writing to different parts of a container file. On decryption you specify the offset of the hidden data. Together with a dynamically expanding filesystem this makes it possible to have an arbitrary number of hidden volumes in a file. It is implausible to reveal the encrypted data without the password, but is it possible to prove there is encrypted data where you claim there’s not? If I give someone one file containing random data and another containing data encrypted with AES, will he be able to tell which is which?”