Abstract
In this paper we present a system for protecting the privacy of cryptograms to avoid detection by censors. The system transforms ciphertext into innocuous text which can be transformed back into the original ciphertext. The expandable set of tools allows experimentation with custom dictionaries, automatic simulation of writing style, and the use of Context-Free-Grammars to control text generation. The scope of this paper is to provide an overview of the basic transformation processes and to demonstrate the quality of the generated text.
Preview
Unable to display preview. Download preview PDF.
References
M. Burmester, Y. Desmedt, and M. Yung. Subliminal-free channels: a solution towards covert-free channels. In Symposium on Computer Security, Threats and Countermeasures, pages 188–197, 1991. Roma, Italy, November 22–23, 1990.
Y. Desmedt. Subliminal-free authentication and signature. In C. G. Günther, editor, Advances in Cryptology, Proc. of Eurocrypt '88 (Lecture Notes in Computer Science 330), pages 23–33. Springer-Verlag, May 1988. Davos, Switzerland.
W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory, IT-22(6):644–654, November 1976.
R. G. Gallager. Information Theory and Reliable Communications. John Wiley and Sons, New York, 1968.
D. Kahn. The Codebreakers. MacMillan Publishing Co., New York, 1967.
DES modes of operation. FIPS publication 81. Federal Information Processing Standard, National Bureau of Standards, U.S. Department of Commerce, Washington D.C., U.S.A., 1980.
R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Commun. ACM, 21:294–299, April 1978.
G. J. Simmons. Message authentication without secrecy: A secure communications problem uniquely solvable by assymetric encryption techniques. In IEEE Electronics and Aerospace Systems Convention, pages 661–662. EASCON'79 Record, October 1979. Arlington, Verginia.
G. J. Simmons. Message Authentication Without Secrecy, pages 105–139. AAAS Selected Symposia Series 69, Westview Press, 1982.
G. J. Simmons. The prisoners' problem and the subliminal channel. In D. Chaum, editor, Advances in Cryptology. Proc. of Crypto 83, pages 51–67. Plenum Press N.Y., 1984. Santa Barbara, California, August 1983.
G. J. Simmons. The secure subliminal channel (?). In H. C. Williams, editor, Advances in Cryptology. Proc. of Crypto 85 (Lecture Notes in Computer Science 218), pages 33–41. Springer-Verlag, 1986. Santa Barbara, California, August 18–22, 1985
Peter Wayner. Mimic functions. Cryptologia, XVI Number 3:193–214, 1992.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag
About this paper
Cite this paper
Chapman, M., Davida, G. (1997). Hiding the hidden: A software system for concealing ciphertext as innocuous text. In: Han, Y., Okamoto, T., Qing, S. (eds) Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol 1334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028489
Download citation
DOI: https://doi.org/10.1007/BFb0028489
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63696-0
Online ISBN: 978-3-540-69628-5
eBook Packages: Springer Book Archive