Home > slashdot > Distinguishing Encrypted Data From Random Data?

Distinguishing Encrypted Data From Random Data?

September 19th, 2010 09:53 admin Leave a comment Go to comments

gust5av writes “I’m working on a little script to provide very simple and easy to use steganography. I’m using bash together with cryptsetup (without LUKS) and the plausible deniability lies in writing to different parts of a container file. On decryption you specify the offset of the hidden data. Together with a dynamically expanding filesystem this makes it possible to have an arbitrary number of hidden volumes in a file. It is implausible to reveal the encrypted data without the password, but is it possible to prove there is encrypted data where you claim there’s not? If I give someone one file containing random data and another containing data encrypted with AES, will he be able to tell which is which?”

Source: Distinguishing Encrypted Data From Random Data?

Related Articles:

  1. Microsoft Dynamics GP “Encrypted” Using Caesar Cipher
  2. Encrypted PIN Data Taken In Target Breach
  3. How To Pull Location Data From Encrypted Google Maps Sessions
  4. MIT Software Allows Queries On Encrypted Databases
  5. New Method for Random Number Generation Developed
blog comments powered by Disqus