Is it possible to decide what is a gpg file?
vedaal at hush.com
vedaal at hush.com
Fri Nov 20 00:40:19 CET 2009
On Thu, 19 Nov 2009 11:02:35 -0500 Brian Mearns
<mearns.b at gmail.com> wrote:
>If he wants to hide the fact that he has an encrypted document,
>that's a completely different matter and calls for steganography.
That's what i thought that he wanted.
Unfortunately, steganography is very difficult to achieve. ;-((
Unlike cryptography, where the standard is that the encryption is
secure, even when the algorithm is known and well studied, no such
progress has been achieved (afaik) in steganography.
Stego relies mainly on creative obscurity. The Holy Grail of a zero-
distortion stego carrier has not yet been found. The standard stego
carriers (image files, audio, video files) have been well analyzed,
and there is still detectable distortion in a carrier stego file
when compared to a normal file of the same size and filetype.
Gnupg presents a great opportunity for use of text as a non-
detectable
distortion carrier in the advancement of steganography.
Extending the example i gave above, it can be tweaked to provide
increased levels of deniability that approach acceptable levels of
crypto security.
(i.e.
it should be just as difficult to prove that a file is
steganographically hidden, as it would be to crack a 256 bit
symmetric encryption algorithm.)
[1] Assuming a gnupg encrypted ciphertext of size 'k', and that
there
are more than 95 ordinary files greater than size 'k' on the
computer that plausibly belong there.
(for a concrete example that's easier to follow, assume the
ciphertext has 400 lines)
[2] Pick any 40 such ordinary files of this size
(and remember them ;-)) )
[3] Armor them using the --enarmor command to produce an armored
text representation of the file.
[4] Select 10 lines from each of the 40 gpg enarmored files, and
concatenate them to a 400 line text
[5] Make a pad to XOR from the text in [4], to the desired
ciphertext.
[6] Save the pad securely somewhere else.
[7] Even if the pad is recovered, it cannot reasonably be proved
that it XOR's to anything on the computer that would produce a
ciphertext
n.b.
This is just a rough draft of a consideration ;-)
What needs to be taken into account, is which parts of the gnupg
ciphertext act as a 'plaintext' in showing that an encrypted file
is present, and how to effectively increase the stego 'carrier
space', to hide those lines.
Anyway,
it might be an interesting area of steganography exploration ;-)
vedaal
More information about the Gnupg-users
mailing list