Skip to main content

Hiding the hidden: A software system for concealing ciphertext as innocuous text

  • Session 11: Subliminal Channel
  • Conference paper
  • First Online:
Information and Communications Security (ICICS 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1334))

Included in the following conference series:

Abstract

In this paper we present a system for protecting the privacy of cryptograms to avoid detection by censors. The system transforms ciphertext into innocuous text which can be transformed back into the original ciphertext. The expandable set of tools allows experimentation with custom dictionaries, automatic simulation of writing style, and the use of Context-Free-Grammars to control text generation. The scope of this paper is to provide an overview of the basic transformation processes and to demonstrate the quality of the generated text.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Burmester, Y. Desmedt, and M. Yung. Subliminal-free channels: a solution towards covert-free channels. In Symposium on Computer Security, Threats and Countermeasures, pages 188–197, 1991. Roma, Italy, November 22–23, 1990.

    Google Scholar 

  2. Y. Desmedt. Subliminal-free authentication and signature. In C. G. Günther, editor, Advances in Cryptology, Proc. of Eurocrypt '88 (Lecture Notes in Computer Science 330), pages 23–33. Springer-Verlag, May 1988. Davos, Switzerland.

    Google Scholar 

  3. W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory, IT-22(6):644–654, November 1976.

    Article  Google Scholar 

  4. R. G. Gallager. Information Theory and Reliable Communications. John Wiley and Sons, New York, 1968.

    Google Scholar 

  5. D. Kahn. The Codebreakers. MacMillan Publishing Co., New York, 1967.

    Google Scholar 

  6. DES modes of operation. FIPS publication 81. Federal Information Processing Standard, National Bureau of Standards, U.S. Department of Commerce, Washington D.C., U.S.A., 1980.

    Google Scholar 

  7. R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Commun. ACM, 21:294–299, April 1978.

    Article  Google Scholar 

  8. G. J. Simmons. Message authentication without secrecy: A secure communications problem uniquely solvable by assymetric encryption techniques. In IEEE Electronics and Aerospace Systems Convention, pages 661–662. EASCON'79 Record, October 1979. Arlington, Verginia.

    Google Scholar 

  9. G. J. Simmons. Message Authentication Without Secrecy, pages 105–139. AAAS Selected Symposia Series 69, Westview Press, 1982.

    Google Scholar 

  10. G. J. Simmons. The prisoners' problem and the subliminal channel. In D. Chaum, editor, Advances in Cryptology. Proc. of Crypto 83, pages 51–67. Plenum Press N.Y., 1984. Santa Barbara, California, August 1983.

    Google Scholar 

  11. G. J. Simmons. The secure subliminal channel (?). In H. C. Williams, editor, Advances in Cryptology. Proc. of Crypto 85 (Lecture Notes in Computer Science 218), pages 33–41. Springer-Verlag, 1986. Santa Barbara, California, August 18–22, 1985

    Google Scholar 

  12. Peter Wayner. Mimic functions. Cryptologia, XVI Number 3:193–214, 1992.

    MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Yongfei Han Tatsuaki Okamoto Sihan Qing

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag

About this paper

Cite this paper

Chapman, M., Davida, G. (1997). Hiding the hidden: A software system for concealing ciphertext as innocuous text. In: Han, Y., Okamoto, T., Qing, S. (eds) Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol 1334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028489

Download citation

  • DOI: https://doi.org/10.1007/BFb0028489

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63696-0

  • Online ISBN: 978-3-540-69628-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics