Disappearing Cryptography 46
Disappearing Cryptography | |
author | Peter Wayner |
pages | 293 |
publisher | AP Professional |
rating | 7.5 |
reviewer | chromatic |
ISBN | 0-12-73867108 |
summary | A study of steganography, making secret informationinvisible to prying eyes. A suitable, though dated, introduction. |
The Scoop
Cryptography, argues the author, has the potential to balance power relationships between individuals and governments. Forcing people to conduct all communications in publicly-readable forms allows the honest to be oppressed by tyrants, criminals, and pranksters. Why should the innocent suffer to help authories track stupid criminals?Wayner mainly concentrates on steganography, hiding secret communications in plain sight. Instead of using ciphers and algorithms to generate a message mathematically indistinguishable from pure random noise, one might instead replace the lowest significant bits of a JPG image with the message. Only those who analyze the image may potentially reconstruct the text.
What's to Like?
Each chapter has three sections, arranged by increasing complexity. The first contains a short anecdote to illustrate the point of the chapter. (Some make immediate sense, while others seem only tangentially related.) The second section discusses the theory. The final section gets into the guts, mathematics and algorithms, analysis and common problems. This division allows readers to go only as deeply as they prefer.Early sections on information theory lay the framework for later chapters. While discussions of error correction and density don't have the cloak and dagger thrill of spy stuff, they're fundamental to serious analysis of techniques. Serious students would do well to use Wayner's extensive and excellent bibliography of books and papers to improve their knowledge.
The middle of the book is excellent. A lengthy discussion of text mimicry starts with analysis techniques, producing in a program hiding a secret message in an innocent-seeming baseball play-by-play. (It includes a dissertation on effective and reversible context-free grammars.) The next chapter, on Turing machines and reversable computing, is particularly interesting (especially after reading The Diamond Age).
More than just data hiding, the final section of the text covers privacy. Anonymous remailers can provide double-blind communication (but see the caveat below). The Dining Cryptographers algorithm of chapter 11 may be used to send a secret message without divulging the sender's identity. The final chapter adds a philosophical spin, explaining the author's biases and his reasoning for promoting secrecy. (He's Cypherpunk friendly.)
What's to Consider?
This is not a book for beginners. Some of the initial theory throws around summations and other pre-calculus constructs as an integral (pardon the pun) explanation of entropy. One of the two large examples is written in Pascal. A second year computer science student should have no trouble understanding the text. A layman might not get past the second chapter (though he could safely skip most of the math.)This book is also dated -- in fact, Hemos recommended it for review partly to prompt the author and publisher to produce a new version. The anonymous remailer chapter is seriously out of date, and it would be nice to have new information about distributed.net, secure peer-to-peer communications, and web stuff. In addition, some of the softwares described have been superceded by new versions and successors.
The Summary
Aging but written with the future in the mind, Disappearing Cryptography favors theory and principles, for the most part. It makes a good introduction to steganography and the study of patterns in digital communications, leading naturally to more detailed works. It may also serve as a starting point to new ideas and discussions. Perhaps 2001 will bring us a new version.Table of Contents
- Framing Information
- Encryption
- Error Correction
- Secret Sharing
- Compression
- Basic Mimicry
- Grammars and Mimicry
- Turing and Reverse
- Life in the Noise
- Anonymous Remailers
- Secret Broadcasts
- Coda
- Mimic Code
- Baseball CFG
- Reversable Grammar Generator
You can purchase this book at Fatbrain.
Re:Governments vs People? (Score:2)
Or are you saying that they should be let off the hook because they are just doing what anyone else would do in their shoes? If that's true, (which I suspect it may well be) then the problem is not with the people but with the system in which they operate. Either way we have to remain vigilant.
Come on everybody, there's no day like today for a revolution!
Re:stenography (Score:1)
By non-targeted, I mean a message that might or might not contain sensitive material. For example, assuming even modest abilities at the NSA, a email containing the string "I'm going to blow up the local mall" is probably a targeted message, but even something as simple as adding a character between the original characters would seem to make a message "non-targeted" (i.e. "I.'.m. .g.o.i.n.g. .t.o. .b.l.o.w. .u.p. .t.h.e. .l.o.c.a.l. .m.a.l.l..."). Obviously, this wouldn't fool a minimal attempt to decrypt it -- as minimal as actually having a real person try and read it -- but wouldn't this slip right past most automated detectors?
How much processing/investigation time does it take to ensure that this message with the above comment isn't actually a terrorist threat?
Assuming the NSA can automatically scan all internet traffic for suspicious words (in every language?) this message gets flagged as a possible target and is stored locally until...
A second program or intellegence anaylyst scans this message to determine whether "blow up" is in the context of a terrorist target or if it refers to "Plastic Patty: the Blow Up Doll That's Fun to be With!".
Obviously, if I'm a research scientist or investment analyst, I'm more likly to be targeted by default and would need a higher level of security.
In other words, I wouldn't rely too heavily on technology, but in my opinion it _may_ be possible to rely on the realities of economoics and time.
Offbase (Score:2)
Most of the issues mentioned involving hidden messages in various formats such as jpg's and audio files are not new news however I feel any information published is good to know from an educational perspective as well as a model for those paranoid types who are concerned with big brother based programs such as Echelon and Carnivore.
Applied Cryptography offered some nice information as did Information Security Management Handbook but for relevance as to the extent of big brother watching, some should go to the NSA's [nsa.gov] website and read up on their archives including Venona, and the Enigma machines to get a grasp of how deep government goes in to get their information and how you can address minimal measures on your own to avoid having your information snooped.
Last September I also wrote a quickie document on Circumventing Carnivore [antioffline.com] that mentions some of these methods to pass information off without it getting caught up on a steriod induced governmental sniffer. Sure it may not be Harvard type material but it should create interest to anyone not too familiar with encryption, ciphertext, algorithms, a simple how to.
As for the title disappearing crypto I hardly doubt it is disappearing in fact with all the hype surrounding PKI's, and the media's ever mentioning of `[H]ackers* I can see many more books, FAQ's, and companies rushing to release more information on crypto from all levels be it beginners to mathematicians based levels.
/me bounces to fatbrain to place an order with info obtained from creditcard.com crackers (of course I'm kidding)
Sexy Unix Chick [speedygrl.com]
Re:stenography (Score:1)
Minor nitpick (Score:3)
#include "disclaim.h"
"All the best people in life seem to like LINUX." - Steve Wozniak
Re:stenography (Score:1)
..and if you've ever been to Coventry, you'd know why....
More thoughts about the book (Score:4)
The easiest part to update at this point is the code. The book contains printed Pascal, something that was almost considered a munition before the latest glasnost in the crypto wars.
There is now C code thanks to Jason Penney. He converted the original Pascal code in a pretty direct fashion. I converted the Pascal into Java. You can any of the three versions by sending me email to pcw@flyzone.com. I'm thinking of getting a website going once I figure out the current state of the export regulations. There's some problems with leaving an open site for North Korea, I think.
The program itself is modular so you can write your own grammars for encoding messages without learning C, Pascal, or Java. That means you don't need to use my lame baseball example. One of the neater developments is a website for converting messages into spam, a medium that is quite lame by default:
http://www.spammimic.com/index.shtml
Finally, if you have suggestions for new information hiding techniques or steganographic algorithms to include in a future version, I hope you'll write and suggest them to me. Any help you can give, would be appreciated.
Thanks.
Re:stenography (Score:2)
No, it's not security through obscurity. Security through obscurity is reliance on the fact that the encryption method is secret to keep the data from being read. It's dismissed because a poor encryption method is vulnerable to mathematical attack no matter how secret it is, and a good encryption method is relatively invulnerable even if the method is known.
But encryption is not the end-all and be-all of security. While it hides the data you're sending, it doesn't hide the fact that you're sending a message, and is thus absolutely worthless against signals intelligence. For example, if a spy in Beijing is sending encrypted letters adressed to CIA headquarters every day from his home's mailbox, then no matter how well encrypted the message he sends, it's still obvious that he's sending information to the CIA. If he's posting pictures of his kids that have an encrypted message hidden in them to a photos newsgroup, it isn't as obvious.
Re:stenography (Score:1)
Stenography is often raised as a solution to the covert exchange of data, but I question its validity. There are a group of very bright people employed by governments who have spent 30 years studying ways to detect hidden information, and the government has almost unlimited resources and the root password to the Constitution at its disposal.
the key to stenography is not neccessarily about keeping the government or whoever from reading the information. What stenography is really about is keeping them from realizing there is any information to be read at all. It becomes more difficult if One regularly posts the JPG's to a newsgroup, some with important data (encrypted then embedded) and some without. First the government has to realize something is going on, then they have to analyze all the JPG's to figure out which ones have data, they must then decrypt it (only to find 4 out of 5 of the messages were about golf games) and even after all that, there is no way to tell who the intended reciepient was.
Jesus died for sombodies sins, but not mine.
Re:Governments vs People? (Score:2)
Re:Erm, Van Eck, anyone? (Score:1)
Interesting (I wish I had some karma to give).
Also, for a brief article, check out The Register today for a brief overview of Tempest:
The Register, TEMPEST [theregister.co.uk]
Re:Times they are a changin' (Score:1)
Mostly true IMHO, but I still believe Bush is a lesser of two evils. Attacks on the constitution have been in progress for quite a while, argueably commencing with FDR. Heck, he added three(?) justices to the supreme court to get his agenda through! Imagine Clinton or Bush making the Supreme court 15 justices. The man had no shame!
While it was only a single issue, I thought the reponses offered by Bush and Gore to the question of school kids getting at pr0n was interesting.
Bush was critisized for recommending that libraries and public schools (public istitution receiving federal funds) implement some sort of filtering software. OK, not great. But did you ever see Penthouse offered in a library or school? Also these are limited to individual machines. Simple to implement and to disable.
Gore offered to force all ISP's to log *all* traffic by IP address. Who gets to see the logs (and who the hell would pay for all the storage?) How long before they would be routinely inspected by law enforcement agencies to protect the public safety and 'the children'? You tell me which is more intrusive and prone to abuse.
Hopefully Bush will renege on Wassemar and remove controls on crypto.
BTW, I voted for Harry Brown.
If you put a collar on for 'protection' today, don't be surprised to find a chain attached tomorrow.
Re:Minor nitpick (Score:1)
But using labels to define what is encryption and what is steganography is not easy because many of the better steganographic algorithms use keys to control how and where the information is hidden.
Here's a simple example from the book. Imagine that you're going to hide information in "bad disk blocks". You might arrange to take some perfectly good disk blocks and mark them bad so the standard DOS will complete ignore them. A simple solution is to take k blocks of data and store them in the first k free blocks.
A more sophisticated solution uses a cryptographically secure random number generator to select a randomly ordered subset of k blocks from a set of n. The random number seed used to start off this random number chain acts like a key. Even if an attacker knows that you're using the old "bad block" trick, he won't know which blocks you chose and in which order you stored the data. This gets more interesting the smaller the size of the block happens to be. When it gets around the bit size, then it's essentially strong encryption.
There are many other keyed solutions. Many of the newer algorithms rely upon them. So do the better watermarks for those who intended to thwart whatever the SDMI folks throw into music. Some of the best solutions work like spread spectrum radio (the original steganographic solution) and allow several people to store their data in the same big pool without disturbing each other. It's pretty cool.
When does keyed steganography become cryptography? Well, that's a question for the language police. The mimic functions can scramble the grammars with a random number generator. I can give you an argument that the scrambled mimic functions could be as strong as RSA, but its just math. Unfortunately the best we can do is wait for plenty of people to try to break a system before we can put much faith in it.
Re:Steganography (Score:1)
Re:stenography (Score:2)
Moreover, this discussion only pertains to private conversation between two individuals. Even if I perform all data exchanges with my bank, doctor and insurance company via encrypted channels, it doesn't mean squat once they decide to share information with each other or anyone else willing to pay for it. I'd much rather do sensitive business with a company that has poor data protection but a strong privacy policy than the other way around.
Power corrupts .... (Score:1)
As you pointed out, politicians are people. The problem is not a question of finding more ethical people to run the government. If only one leader needed to act ethically, we might maintain some kind of ideal society until such time as we made a mistake and put in the wrong leader. The problem is that governments have been given powers that people did not rightly possess in the first place to give them. I recommend reading Human Action [mises.org] by Ludwig von Mises:
Re:Times they are a changin' (Score:2)
Maybe but only in the most useless of senses.
Let's imagine that I'm 65 years old and I have 200,000 in the bank. I have a choice between one scumbag who is going to take it all or another who is going to take 199,800. Which do I choose? The lesser of two evils of course. At least I can break the news to my wife over a nice dinner.
Since Limbaugh has turned liberal into a dirty word I'll claim to be a progressive, but I still think your guy Brown is a Big Mac with fries better than the grease bags the major parties put up for us to choose from.
Like you I choose to skip them this time.
--
Re: Coventry etc. (Score:1)
Re:stenography (Score:1)
And as for the ring-road... Gah ! What an abortion. Truly the worst in western Europe.
I've been to nicer, prettier places than Coventry, like Sarajevo, Mostar, Srebrenica...
Re: Coventry etc. (Score:1)
>us the campaign had they been the ethics used by
>the US Army of WW2?
You seem to be asking "would disclosure of Enigma's compromise have caused the certain loss of the war?" It's hard to say for sure, even in retrospect. You might as well ask, "would faster dissemination of information to field commanders have given us a tactical edge over Germany, allowing us to finish the war sooner?" Current philosophy and doctrine seem to say "no" to the first question and "probably" to the second.
Remember that even if Germany had found out about Enigma's compromise they didn't really have anything to replace it with, so they'd have been forced to either abandon it completely for something less reliable/fast/secure or somehow recall the encoding wheels and distribute new ones to all of their stations. In either case their communications would be disrupted or interceptable (or both) until a new and better system was in place. Besides, even if they did manage to change the wheels in all of the Nazi stations, how long would it have taken Turing to break the code again if it were based on the same principles? It's kinda like the situation with the DVD CCA and DeCSS modernly...
I'm no historian, though, so take this with a grain of salt...
Re:Cryptography (Score:1)
Re:But.. (Score:2)
Times they are a changin' (Score:2)
Given our next President and the impending erosion of freedoms I can understand the motivation though. Once a CIA brat, always a CIA brat...
--
Re:stenography (and use of deciphered information) (Score:1)
But that's an issue of strategy and ethics, not technology. You're really asking whether it's ever proper to sacrifice something (or someone) now for some supposed benefit in the future.
so? (Score:1)
-Yeah, I have 27 karma from my non-coward posts.
Re:stenography (Score:2)
I think that judging the agencies who use (and break) encryption is unwise - after all, I want the NSA to break the next Enigma code in the next big war, even if the government has swung too far to the fascist side of things.
As for technology as a double-edged sword, well, that's undeniably true, but the implication of using the word "sword" is a violent one. I prefer to think of technology, and science in general (esp. math!) as a natural resource. We can build computers with it; we can build 100 megaton bombs with it. In the end, the way we use technology is our testament to the ages.
Erm, Van Eck, anyone? (Score:3)
--Josh Adams
Re:Steganography (Score:1)
A quick view of the download page reveals only tarballs, so while I guess this is good thing, it would be a hell of a lot better if you actually had a few binaries (for consumer-level platforms) so that Joe Windoze can decide he wants to encrypt his manifesto/novel/pr0n, he can do so without installing a *nix and learning how to MAKE a binary from source.
Remember that the 'envelope' anology works only if *most* people use envelopes (encryption/steganography) around their letters rather than sending (unencrypted) postcards.
Come on, guy. It's not that hard to compile a console-style win32 binary.
Re:More thoughts about the book (Score:1)
Re:stenography (Score:2)
Sometimes they'd do things like first send out a "surveillance" plane and let the Germans see it. Then the Germans would think that the British had just happened to see them and thus the attack was to be expected. Those Germans must have been getting pretty damn frustrated when every single secret covert operation was discovered by some "chance" flyby from a surveillance plane. But they deserved it for being so damn smug about enigma, not to mention the age old end-user weak link (i.e. people in the field using the same damn keys over and over, trusting that the machine would just magically make all their correspondence uncrackable).
Coventry sacrifice is a myth (Score:2)
--
Re:Governments vs People? (Score:1)
That's what bothers me....
Re:Times they are a changin' (Score:2)
Of course I don't why would you think I do!
Ahhh, I see. Because I dissed Bush you assume that I support Clinton. While this might be the societal norm, you might do well to keep a bit more open mind. Bush and the bulk of the GOP are every bit as dangerous as Clinton and the bulk of the Democrats.
Before this gets modded -1 offtopic you should spin by my web site listed in the sig. If you aren't convinced by my accusations of an arms for hostages Slick Willy style then we can continue this discussion there.
--
Re: Coventry etc. (Score:1)
Decisions of that type were made when our intelligence operations were young and took themselves much more seriously than they do now (if that's imaginable
Please don't judge modern intel analysts based on the poor decisions of their forebears
Re:Power corrupts .... (Score:2)
Re:stenography (Score:1)
My SO comes from Coventry and even she agrees with me, it's the pits.
Ian
P.S.
I don't frequent uk.misc.... at all.
Although you obviously have intimate knowledge of those sort of newsgroups.
P.P.S. If you want to flame me then have the courage to post as something other than "anonymous Coward"
HAND
Re:Coventry sacrifice is a myth (Score:1)
It has to be real, because I saw it in In the Shadow of Z'ha'dum [midwinter.com]
---
steGAnography (Score:1)
It's a book about masked data, not how to dictate your boss' correspondence.
Say it with me... Ste-gan-o-gra-phy
Bzzt, wrong! (Score:1)
No, it isn't. Stenography is rapid writing system commonly used by secretaries before tape-recorders became commonplace.
I suspect you intended to write steganography!
Code? (Score:2)
Governments vs People? (Score:3)
Seems like there's a bit too much buck-passing and not enough responsibilty, on ALL levels.
Steganography (Score:4)
Information Hiding Techniques for Steganography and Digital Watermarking by Katzenbeisser and Petitcolas is a book that has just been published last year and contains a lot more detailed technical information. However, Disappearing Cryptography is at least an amusing book to read.
There is also a bunch of software out there that can be used to embed hidden information into images and sound files. However, most of the programs can be detected. Read the paper by Westfeld and Pfitzmann, "Attacks on Steganographic Systems".
I myself have written a tool to hide data into JPEGs. It's called OutGuess [outguess.org].
You can find more software here [tripod.com].
But.. (Score:2)
stenography (Score:4)
Let me give you an example. During WW2, the English developed a technology for decrypting the communications of the German military. One of these messages revealed that the city of Coventry was to be attacked. This presented a problem: if Coventry was defended or evacuated, the enemy would realise that their cryptosystems had been compromised, which would cost the English a key strategic advantage. So the city was sacrificed.
Now, the spiritual descendants of these early cryptanalysts work for the NSA. If they have the technology to scan for stenographically concealed data (or even to decrypt PGP) don't expect them to announce the fact. The UK goverment have recently decided that they want to be able to read every packet on the UK Internet backbone: why would they bother if it was that easy to conceal information?
In other words, don't rely too heavily on technology, because it's a two edged sword.
Re:Steganography (Score:1)
It is somewhat more difficult when you don't have access to a win32 machine. If it is so easy, why don't you provide us with these binaries? I agree with your line of reasoning, but I think a little help rather than whining would help the cause a lot more...
-bluebomber
Re:stenography (Score:1)
Stenography The art or process of writing in shorthand. [dictionary.com]
Steganography The art of writing in cipher, or in characters which are not intelligible except to persons who have the key [fairly loose definition from Webster's] [dictionary.com]