[Cryptography] Licensing of cryptographic services in France
Christian Huitema
huitema at huitema.net
Thu Aug 29 18:13:52 EDT 2024
On 8/29/2024 11:59 AM, Phillip Hallam-Baker wrote:
> On Wed, Aug 28, 2024 at 11:12 PM Christian Huitema<huitema at huitema.net>
> wrote:
>
>> On 8/28/2024 4:57 PM, Phillip Hallam-Baker wrote:
>>> Steganography just means a slight reduction in payload capacity.
>>> instead of passing 1200 bytes of payload at a time, it would be maybe
>>> 1140. So worst case 5%-10% reduction in bandwidth.
>> That's not the figures that I am used to. The most common algorithm is
>> to encode the hidden message in the least significant bits of an image
>> encoding, but then the signal is occupying at most 10% of the bits. But
>> this is kind of an upper bound. If I understand correctly , there is a
>> whole body of research developing better steganography, and developing
>> algorithms capable of detecting the presence of embedded messages.
>> Everything else being equal, the higher the ratio of message to payload,
>> the easier it should be to detect the presence of steganography.
>>
> Steganography is simply concealing the fact there is a message there.
>
> In a world where HTTP crossed the net unencrypted by default, twiddling the
> LSB of images was the best we can do.
>
> In a world where everything goes over QUIC, we can disguise an encrypted
> two way MOQ session as a HTTP/3.0 over QUIC session.
>
> Steganography has always been double ended, creating easier camouflage to
> hide in is just as valid as making use of the existing cover.
Define "disguise". You can certainly have some externally visible
metadata that says "this is a web session". In fact, MoQ runs over
Webtransport, which itself runs over HTTP3, so technically MoQ is HTTP3,
no disguise required. But the attackers and classifiers are not relying
on the metadata. They are doing traffic fingerprinting, using machine
learned algorithms that classify streams based on the patters and timing
of packets, i.e., features that are visible through the encyption.
Beating that is very hard, if even feasible. You could try to add enough
fake traffic as chaff to the base application traffic and change the
packet patterns, but AFAIK you have to use a very large amount of chaff
to be effective, and that is by itself its own pattern.
-- Christian Huitema
More information about the cryptography
mailing list