1,203 Hits in 2.9 sec

On Public-Key Steganography in the Presence of an Active Warden [chapter]

Scott Craver
1998 Lecture Notes in Computer Science  
The so-called prisoners' problem, in which two individuals attempt to communicate covertly without alerting a "warden" who controls the communications channel, has taken a number of forms, adorned with  ...  This technique is possible through the use of two distinct channels rather than one: the subliminal channel for steganographic communication is augmented by a supraliminal channel, one in which information  ...  The prisoners' problem The prisoners' problem was first posed by G.J. Simmons in 1983 , and is generally considered to be the de facto model of covert communication.  ... 
doi:10.1007/3-540-49380-8_25 fatcat:jbu42niowna3ve6stjug2fxl4m

Provably Secure and Subliminal-Free Variant of Schnorr Signature [chapter]

Yinghui Zhang, Hui Li, Xiaoqing Li, Hui Zhu
2013 Lecture Notes in Computer Science  
In particular, our scheme can completely close the subliminal channels existing in the random session keys of Schnorr signature scheme under the intractability assumption of the discrete logarithm problem  ...  Subliminal channels present a severe challenge to information security. Currently, subliminal channels still exist in Schnorr signature.  ...  We are grateful to the anonymous referees for their invaluable suggestions. This work is supported by the National Natural Science  ... 
doi:10.1007/978-3-642-36818-9_42 fatcat:xxmitw2yeraflnc7bw6fvhf33e

Page 3878 of Mathematical Reviews Vol. , Issue 86h [page]

1986 Mathematical Reviews  
Gur Dial (Florianopolis) Simmons, Gustavus J. (1-SAND) 86h:94018 The prisonersproblem and the subliminal channel.  ...  In this paper we decribe one way to realize such a subliminal channel, i.e., a solution to the prisonersproblem.”  ... 

A novel group signature scheme with subliminal channel

Jian-hong Zhang, Peng-yan Li, Xu-bing Zhao
2016 Wireless Communication and Sensor Network  
Secondly, we evaluate Jan-Tseng signature schemes with subliminal channel in ICPP'99 and show that any user can change the signature, such that the subliminal message receiver cannot get the subliminal  ...  The subliminal channel in a cryptographic protocol such as an authentication system or a signature scheme provides an additional channel from the sender to an authorized receiver and can't be read by any  ...  For instance, in the prisoners problem [13] or credit card application, the wardenry or the card holder doesn't hope there is some subliminal channel in their messagesignature pairs.  ... 
doi:10.1142/9789813140011_0072 fatcat:zltjs26l5nebtjmxmglcu444fy

On the Existence of Subliminal Channel in Instant Messaging Systems

Lingyun Xiang, Yuhua Xie, Gang Luo, Weizheng Wang
2015 International Journal of Security and Its Applications  
The broad-band subliminal channel can be established in Skype and QQ messages. Therefore, two subliminal channel schemes are proposed to embed and extract subliminal information.  ...  Finally, performances of the proposed subliminal channels are compared with those of the ones based on ElGamal digital signature and Newton channel.  ...  For the warden in the Prisoners' problem introduced by Simmons [1] , the randomness of a cryptosystem mainly includes three categories: 1) the stochastic parameters inputted from the cryptosystem, such  ... 
doi:10.14257/ijsia.2015.9.3.27 fatcat:w3dpsokcvbejfg22wrdbpogxr4

Special Uses and Abuses of the Fiat-Shamir Passport Protocol (extended abstract) [chapter]

Yvo Desmedt, Claude Goutier, Samy Bengio
1988 Lecture Notes in Computer Science  
A non-trivial solution to avoid these subliminal channel problems is presented. The notion of rehtiue zero-knowledge is introduced.  ...  Using an extended notion of subliminal channels, several other undetectable abuses of the Fiat-Shamir protocol, which are not possible with ordinary pssports, are discussed.  ...  The last one however agrees that the prisoners may authenticate the communication. Simmons explains how a subliminal channel can be set up [17] .  ... 
doi:10.1007/3-540-48184-2_3 fatcat:in7hisomkvgwbetkk66acby6jq

A traceable E-cash transfer system against blackmail via subliminal channel

Chin-Ling Chen, Ming-He Liu
2009 Electronic Commerce Research and Applications  
Now, more and more digital signature applications use a subliminal channel to transfer secret messages.  ...  The subliminal channel is the most popular method, which notifies the designated receiver to transmit secret messages. Simmons was the first to propose this concept in 1983.  ...  Acknowledgements We thank the reviewers for their insightful comments which helped to improve this paper significantly.  ... 
doi:10.1016/j.elerap.2009.04.012 fatcat:r73x5d3uifdqrdhnsux5exlcka

From 'Steganographia' to Subliminal Communication [chapter]

Otto J. Horak
1995 IFIP Advances in Information and Communication Technology  
Subliminal channels as a special kind of covert channels, its detection and realization in digital signatures are shown as the most recent examples.  ...  This period starts with mass applications of digital computers in the early 1970s. Steganography now appears as covert channel in information processing, storage and communications.  ...  A classical example of a covert channel was the scheme used by some American prisoners of war during WW II to conceal information from enemy censors by causing the sequence of dots to the letter "i" and  ... 
doi:10.1007/978-0-387-34943-5_18 fatcat:npwdtl5bdbedviwhj7vjt76o2u

A Subliminal Channel in Secret Block Ciphers [chapter]

Adam Young, Moti Yung
2004 Lecture Notes in Computer Science  
It is a broadcast channel that assumes that the sender and the receiver know the subliminal message ms (i.e., something derived from their common key).  ...  In this application, the secret block cipher securely and subliminally transmits the symmetric key of the sender and receiver to the malicious designer and confidentiality holds even when the cipher is  ...  Subliminal Channels and Backdoor Ciphers To show that the notion of a subliminal channel was applicable in practice, the prisoner's problem was devised [21] .  ... 
doi:10.1007/978-3-540-30564-4_14 fatcat:vaspv5ew2ffzzfmm3suoxlkasu

Eliminating Steganography in Internet Traffic with Active Wardens [chapter]

Gina Fisk, Mike Fisk, Christos Papadopoulos, Joshua Neil
2002 Lecture Notes in Computer Science  
Network security is one of the most pressing and difficult problems facing modern private organizations and governments.  ...  We use MRF to reason about opportunities for embedding covert or subliminal information in network protocols and develop both software to exploit these channels, as well as an active warden implementation  ...  Active wardens have been an area of postulation since Simmons [31] introduced the Prisoners' Problem in 1983.  ... 
doi:10.1007/3-540-36415-3_2 fatcat:plrq26ckfjfpnaivu4v2b2zyci

Kleptography: Using Cryptography Against Cryptography [chapter]

Adam Young, Moti Yung
1997 Lecture Notes in Computer Science  
The SETUP mechanisms presented here, in contrast with previous ones, leak secret key information without using an explicit subliminal channel.  ...  In this paper we extend the study of stealing information securely and subliminally from black-box cryptosystems.  ...  Acknowledgments: We would like t o acknowledge Jo Schueth for pointing out the statistical attack on the RSA key setup and Hari Sundaram for improving the efficiency of the PBRM recovery algorithm.  ... 
doi:10.1007/3-540-69053-0_6 fatcat:e2vwl2izxfcqhb6mjvuybgdndu

Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles

Jose Maria de Fuentes, Jorge Blasco, Ana Isabel González-Tablas, Lorena González-Manzano
2014 International Journal of Distributed Sensor Networks  
In this work, two mechanisms for vehicle reporting are proposed based on two information hiding techniques-subliminal channels and steganography.  ...  The approach is to embed information into beacon messages either in the signature process (subliminal channel) or altering the least signific nt bits of selected sensorial field (steganography).  ...  González-Vasco and Dr. Julio C. Hernandez-Castro for their helpful suggestions. Furthermore, authors would like to thank the anonymous reviewers for their valuable comments.  ... 
doi:10.1155/2014/120626 fatcat:gwgky45hl5donfsalld54dp4za

Bandwidth-Optimal Kleptographic Attacks [chapter]

Adam Young, Moti Yung
2001 Lecture Notes in Computer Science  
In the second part of this work, we nevertheless show a subliminal channel attack on DSA that assumes the existence of a small amount of non-volatile memory in the device.  ...  Kleptographic attacks are capable of leaking the private keys of users securely and subliminally to the manufacturer of the black-box system (based on the availability of public values, such as keys (produced  ...  Thus, the SETUP attack can be utilized securely and subliminally under the observance of a warden, as in the case of Simmons original Prisoner's Problem, without requiring that the prisoners exchange a  ... 
doi:10.1007/3-540-44709-1_20 fatcat:reo4lxjbxrdmxamjhurcvlll6u

The prevalence of kleptographic attacks on discrete-log based cryptosystems [chapter]

Adam Young, Moti Yung
1997 Lecture Notes in Computer Science  
The setup attack on DSA exhibits a large bandwidth channel capable of leaking information which hardware black-box implementations (e.g., the Capstone chip) can use.  ...  We also show how to employ such channels for what we call "device marking".  ...  Related Work The notion of a subliminal channel is due to Gus Simmons [Sim85, Sim93] .  ... 
doi:10.1007/bfb0052241 fatcat:q5kavyhxrjh4xmfuu7k6brgeya

The Dark Side of "Black-Box" Cryptography or: Should We Trust Capstone? [chapter]

Adam Young, Moti Yung
1996 Lecture Notes in Computer Science  
We also relate message-based SETUPS and subliminal channel attacks. Finally, we reflect on the potential irriplications of "trust managernent?  ...  in the contcxt of the design and production of cryptosystems.  ...  Acknowledgements: W e would like to acknowledge I h e liclp of M a t t Hastings for refining some of the attacks described  ... 
doi:10.1007/3-540-68697-5_8 fatcat:ppsohd345jec3etixujlwkrnjq
« Previous Showing results 1 — 15 out of 1,203 results