Cryptology is the use of coded, secret messages to protect

advertisement
Part One: What is steganography, watermarking, and steganalysis? How are these each
accomplished?
Cryptology is the use of coded, secret messages to protect information, while
steganography hides a message in a cover document or file. Evidence of cryptology and
steganography can be found even as far back as the 5th Century BC A political prisoner
of King Darius shaved the head of one of his slaves and tattooed a message on his scalp.
Once the slave’s hair had grown out, he sent the slave to deliver the message. Invisible
inks, another form of steganography, also existed in the age of Caesar.
- May mention other types of older cryptology and steganography that existed in
medieval ages, including hidden messages on tablets, soles of shoes, women’s
earrings,
- Go into detail about how steganography was used in WWII. German spies used it, as
well as the example of the fourteen code talkers on the Western Front who used the
Comanche language to explain tines and geographic features in France and Germany.
Steganography now is accomplished in the digital world through the use of mathematics
(algorithms).
- accomplished through encryption = encoding information where only the person who
possesses the correct electronic key can decode it
- First, the information is scrambled using an algorithm. This algorithm creates a key
which is later used to transform the encrypted back to its original form so that it can
be understood by the receiver. For example, we could use the multiplication of two
50-digit prime numbers to create a 100-digid product that becomes the key. There are
public and private keys. Private key cryptography uses the same key for both the
encryption and decryption process. Therefore, the sender and receiver of the secret
information have the same key. Public key cryptology uses both a public and private
key. The sender uses the public key and it can be published in directories. The
private key is necessary for the receiver to decrypt the message.
Information can be hidden in a variety of files. Steganography replaces unused parts of
data with the secret information. Information can be hidden in text, for example, in the
spaces between words. This type of information hiding is more successful than
steganography that consists of hidden information in infrequent spelling errors and in
words replaced by synonyms. One of the main requirements for hiding information in
digital sounds and images is redundant, repetitive information. Steganography uses this
part of the sound or image to hide the secret information.
- another example is embedding a mobile telephone conversation into an Integrated
Services Digital Network (ISDN) video conferencing system
The easiest way to hide information is to replace the least significant bit (LSB) of every
element with one bit of the secret message. For example, in a picture, each pixel is made
up of 24 bits of information, which, to the computer, consists of 0s and 1s. To insert the
secret information, one can change these 0s and 1s to bits from of secret information.
The most useful way to insert these bits is do to do so in a random way according to the
secret key. This makes it harder for others to break the code. The updated picture should
not appear noticeably different, or else attackers may become suspicious.
- will talk about my examples with steganography. So far, I have downloaded and used
only one application, called Hide-In-Picture. It was very easy to use and, in my first
attempt, I embedded a word file into a picture. I could set passwords, change the file
names, change the encryption algorithm for the file, and use a setting for a check on if the
file has been changed since I originally embedded the information. I will try to determine
how effective this application is, and how often this and similar programs are used by the
average individual. I also will try different applications if possible, and comment on my
experiences with all.
Watermarking is a type of steganography that is used when other parties know of the
existence of hidden information and may have the desire to remove or change it. It is
most often used for copyright protection. One can protect the validity and originality of
information by embedding information about the source of the data into files. Another
application of watermarking is fingerprinting, which involves inserting a different
watermark into each copy of a file in order to monitor who is receiving the file.
Therefore, one can trace back copies that were illegally produced to the original receiver.
Two other applications of watermarking include the determination of the authenticity of
an image and the elimination of unauthorized copying of media. --- will be discussed
further…
Steganalysis is the process of finding hidden information and then disabling it. Breaking
a steganography system includes three steps. First, is the detecting phase. Unusual or
repetitive patterns may be detected without aids, but disk analysis programs can find
unused areas in a file and report on the hidden information. When sounds or images are
distorted by the embedded information, it is called ‘perceptible noise.’ Filters can be
used to find TCP/IP packets whose headers contain hidden or invalid information. One
may also look for unusual color schemes.
The second step is the extracting phase and the third step is the disabling of the embedded
information.
- discuss idea of ‘brute force’ – using computers to try every possible key until it finds
the right one. Talk about creating stronger, longer algorithms
- removing watermarks – how feasible is this? Do these applications like StirMark and
UnZign work? - test them out and comment on what happened. Will this be a
problem even when algorithms become stronger?
Part Two: What are some of the uses and concerns regarding steganography?
- conflict between government’s goals and all parts of society
In the 1990’s, researchers and scientists have made a strong push towards eliminating
government controls of encryption. The U.S. has had export laws that limit the sale of
strong encryption products overseas. These laws existed in order to keep foreigners from
having the ability to encode their information. This way, the U.S. can have much more
open access to information that might be related to potential terrorist and criminal action
against the U.S. – investigating and prosecuting criminals, information gathering
– talk about escrowed encryption, private meetings, etc.
Why did so many individuals want to eliminate these laws?
-
Businesses see it as helpful, especially if they are international companies. They
transfer important information with customers, suppliers, and partners, and want to
make sure that it does not end up in the hands of competitors, criminals, foreign
governments, and other customers.
- Individuals transfer information over insecure connections (Internet, cell phones, etc.)
constantly, such as banking and finance information, medical records, etc.
- Issue of the First Amendment, free speech.
These laws are now eliminated, and people have much greater access to steganography
applications.
When researchers discovered this technology in the 1970’s, they were uncertain as to
how to deal with it. Should they release this information to the public? Will it do more
harm than good?…comparisons to nanotechnology…Figured it was best to release
information, for eventually foreign countries would discover it as well and end up ahead
of the U.S.
How has the government controls effected our progress in steganography? Many feel
that this slowed our progress, and it is important for us to research the area more in order
to be ahead of other countries. Contrast the views of other countries, such as Russia, with
our government’s views. Talk about the grant in 2001, and also talk about ideas of how
to deal with the drawbacks of releasing this information, but why it is necessary.
How did September 11th effect people’s opinions? Senator Judd Gregg, only two days
after the attack, “called for international cooperation to create tighter controls over the
use of strong encryption and for decryption products to be put in the hands of government
so that communications and documents could be cracked with the circumstances
required”(Strategic Finance, Nov 2001). How did researchers feel? How did the public
feel?
Dr. Patrick Ball has been traveling to train human rights workers in information gathering
for the past nine years. Steganography has been very helpful in situations in which a
country is trying to gather information to prove government abuses. This has been
helpful in Guatemala and Haiti.
What are some future uses/benefits of steganography? How will this change our future?
- more privacy
- online cash transactions
- e-signatures
- copyrighted MP3s, image files, e-books, etc.
- protection from identity thieves
- ability to validate the origin of business information
--- these will all be discussed further in my paper, and I will try to find more possible
future applications.
Download