[Cryptography] propaganda on "hurdles for law enforcement"

Richard Outerbridge outer at sympatico.ca
Sat Jul 26 19:45:47 EDT 2014


On 2014-07-26 (207), at 16:04:10, Peter Fairbrother <zenadsl6186 at zen.co.uk> wrote:

> On 25/07/14 22:24, John Denker wrote:
> 
>> [….]

>> To say the same thing in more constructive terms: This serves
>> as an example of /cover traffic/.
> 
> There is a another, different hypothesis - that the lump of data is the same lump of data, possibly re-encrypted, as another lump of data somewhere else.
> 
> Perhaps we need a new definition of (pseudo-) random for that situation.
> 
> On a personal note, I have been struggling with this idea, in terms of cover traffic, for the last 9 or 10 years - but I haven't gotten anywhere much beyond the obvious, nothing noticeably brilliant :(
> 
> IMO. the whole subject of cover traffic needs to be investigated much further, and with rigor.
> 
> Take, as an example, a steganographic filing system where the files are kept in a public cloud, and it is easy for an observer to see when encrypted files are stored and recovered.

Take, as an example, a one time hotline, a digital one time pad, constantly occupying a certain channel with indistinguishable noise. And every once in a while a signal gets added to the noise.
__outer





More information about the cryptography mailing list