Re: nettime Pirate Utopia, FEED, February 20, 2001

2001-09-24 Thread Ted Lemon


 Actually, dictionary attacks reveal about sixty percent of passwords, 
 so for every six passwords you find on a dictionary attack, you can 
 infer ten actual stegotexts times the ratio between your analyzed and 
 discovered (possibly-false) positives.  

This presumes that people who use steganography in the real world
right now are similar in their password security habits to the general
computer user population.  Steganography is an esoteric practice, and
really only interesting in the real world to people who have much more
serious security worries than the average computer user.  So I think
this is actually unrealistic - I would bet that close to 0% of
encryption keys used to encrypt data sent in the real world using
steganography (assuming steganography is being used by anybody but
crypto researchers right now) would be susceptible to dictionary
attack.

   _MelloN_





-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: nettime Pirate Utopia, FEED, February 20, 2001

2001-09-24 Thread Ben Laurie

Grant Bayley wrote:
 
  --- begin forwarded text
 
  Status:  U
  From: Julian Dibbell [EMAIL PROTECTED]
  To: [EMAIL PROTECTED]
  Subject: nettime Pirate Utopia, FEED, February 20, 2001
  Date: Thu, 20 Sep 2001 08:37:20 -0500
  Sender: [EMAIL PROTECTED]
  Reply-To: Julian Dibbell [EMAIL PROTECTED]
 
  Key concepts: steganography, encryption, Osama bin Laden, intellectual
  property, temporary autonomous zone, pirates.
 
 It's a shame that Niels Provos, one of the main developers of open-source
 Steganography software at the moment wasn't able to detect a single piece
 of information hidden steganographically in a recent survey of two million
 images...  Sort of destroys the whole hype about the use of it by
 criminals.

He did only look for one particular encoding technique (at least, that
was true when we discussed it in April), so his failure to find anything
cannot be considered to be conclusive.

Cheers,

Ben.

--
http://www.apache-ssl.org/ben.html

There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit. - Robert Woodruff



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: nettime Pirate Utopia, FEED, February 20, 2001

2001-09-22 Thread Adam Back

On Fri, Sep 21, 2001 at 06:19:43PM +0100, Adam Back wrote:
 My point was higher level.  These systems are either already broken or
 fragile and very lightly peer reviewed.  There aren't many people
 building and breaking them.

To elaborate on this slightly.  There are inherent reasons why
steganography is harder than encryption: the arms race of hiding data
in noise is based on which side (the hider vs the detecter) has the
best understanding of the characteristics of the host signal.  The
problem is the host signal is not something with clear definition,
what is known is primarily empirical statistical analysis.
Manipulating signals with noise in them to replace noise with the
stego text is not so hard, but knowing and modeling the signal and the
source noise is not a solvable problem.

There will be a never-ended stream of more refined and accurate models
of the signal itself, and biases in the equipment that collects the
signal.  So there will be always a risk that the detecter gets the
edge by marginally more accurately modeling the bias, or finding a
some new bias not modelled by the hider.

 Or, they found existing stego software and evidence of it's use on
 seized equipment or even some 2nd generation, non-publicly available
 stego software on seized equipment.

There have subsequently been news reports claiming the terrorists had
non-publicly available stego software written by their own expert.
This still conflicts with numerous other reports, so it's not clear
what's going on.

But either way none of this would help the signals intelligence
special interest groups arguments to ban steganography, anonymity or
encryption as if anything it would be proof by example of the argument
that terrorists won't have difficulty obtaining software as they can
in the worst case write it from scratch.

Adam



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: nettime Pirate Utopia, FEED, February 20, 2001

2001-09-22 Thread jamesd

--
On 22 Sep 2001, at 16:11, Adam Back wrote:
 There will be a never-ended stream of more refined and
 accurate models of the signal itself, and biases in the
 equipment that collects the signal.  So there will be
 always a risk that the detecter gets the edge by marginally
 more accurately modeling the bias, or finding a some new
 bias not modelled by the hider.

Since the genuine signal has many sources, with different,
changeable, and idiosyncratic biases, the hider always has an
advantage over the detector.  If they have comparable skills,
and invest comparable work, the hider will always win.


--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 i21IhXGvGRwJ+jgxo4KF7T2KEHyMQFN3oGBVwEVM
 4h+lcypb/lRfbuL3ZD17GqGiA5h+Enw8aj9LUaShL




-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: nettime Pirate Utopia, FEED, February 20, 2001

2001-09-21 Thread Ariel Waissbein

Hi to you all! A word on this thread. I think you are giving missleading
assertions. It's just a subtlety I'd like to mention.

Perhaps you should simply notice that getting a one-use-only webmail 
email account and sending the message the bird is flying home or any 
James  Bondish message like that to another one-time-use-only webmail
account is also steganography. You hide a message between millions
of messages within millions of accounts! 

It is impossible to browse and identify all those messages as dangerous. 
And that is because they aint. However, having a particular message,
photo, or any piece of digital information and trying to gain
information
from it is quite a different task. Here steganography as you speak could
enter the scene. My feeling is that there is no generical tool for 
handling all the sensible inf traveling through the web and that it's
construction should be dimmed (theoretically) impossible. However,
practical solutions to specific and well defined problems can and 
are devided daily. I hope you see my point.

regards,
Ariel Waissbein



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: nettime Pirate Utopia, FEED, February 20, 2001

2001-09-21 Thread Adam Back

My point was higher level.  These systems are either already broken or
fragile and very lightly peer reviewed.  There aren't many people
building and breaking them.

I did read the papers; my summary is the above, and from that I
surmise it would not be wise for a terrorist to use current generation
steganography systems.

Probably more likely would be the other posters comment that they
would use pre-arranged manually obscured meaning in inoccuous email,
which if done with low enough bandwidth is probably pretty damn
robust and secure.

However unlike the other poster, I don't consider this stego in the
sense of the news report being discussed -- they are talking up the
idea of banning anonymity and steganography software -- where-as in
reality the software is not being used, doesn't make sense to use due
to the current state of the art.  The lobbying by the signals
intelligence community is mis-characterizing the technical reality to
further their own special interest which is easy to do as both the
public and the media are easy to manipulate as they have even less
understanding of anonymity and steganography than they do of
confidentiality.

Adam

On Fri, Sep 21, 2001 at 03:10:05AM +0200, Nomen Nescio wrote:
 No, Provos' own system, Outguess, www.outguess.org, is secure in the
 latest version.  At least, he can't break it.  It remains to be seen
 whether anyone else can.  See the papers on that site.



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



nettime Pirate Utopia, FEED, February 20, 2001

2001-09-20 Thread R. A. Hettinga


--- begin forwarded text


Status:  U
From: Julian Dibbell [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: nettime Pirate Utopia, FEED, February 20, 2001
Date: Thu, 20 Sep 2001 08:37:20 -0500
Sender: [EMAIL PROTECTED]
Reply-To: Julian Dibbell [EMAIL PROTECTED]

Key concepts: steganography, encryption, Osama bin Laden, intellectual
property, temporary autonomous zone, pirates.

Attention conservation notice: It's 3300 words that I wrote 7 months ago for
the late, lamented FEED. In retrospect, it's possibly a little too
lighthearted about the wiles of terrorism and a little too gloomy about the
demise of Napster. But it's timely again, I think, all the same. Especially
in light of the 9/11-inspired crackdown on crypto.


FEED 02.20.01

PIRATE UTOPIA
What does Osama bin Laden's Web porn infiltration have to do with Napster's
fight for life? Julian Dibbell connects the microdots.

Two weeks ago USAToday broke the shocking news that Osama bin Laden's
terrorist organization has infiltrated the world's supply of Web porn,
hiding messages for its global operatives deep within the digits of pictures
posted on Godless Western triple-X sites. For historically minded readers,
the article afforded a moment of wonder at the depths of the
national-security establishment's Cold War nostalgia and the media's
willingness to indulge it. There was the old familiar intimacy of the
alleged subversion, the thrilling suggestion that the enemy might lurk among
us everywhere, sneaking into our bedrooms and our cubicles under cover of
cultural trash. You very well could have a photograph and image with the
time and information of an attack sitting on your computer, and you would
never know it, one cyberwar expert told USAToday's reporter.

I confess, though, that I got a bit nostalgic myself when I read the story.
Not for the Cold War -- I was born too late to enjoy it in the fullness of
its Eisenhowerian heyday -- but for its Bush-era aftermath. Specifically, I
found myself looking back with melancholy fondness upon the summer of 1992,
a moment perhaps not equal to the summer of '67 in its hold on the memories
of a generation but one which for me, at least, holds much the same sense of
freedom and promise in the bubble of its recollection. It was a moment,
after all, when radical political thought was just beginning to adjust to
the reality of '89, just rising to the challenge of imagining the
possibilities that that reality implied. It was a moment, as well, when the
Internet, long a distant, reverie-inspiring rumor known firsthand only to
military contractors and computer-science majors, was just starting to enter
the lives of the rest of us. But most importantly, perhaps, and certainly
not at all coincidentally, it was the moment when I first learned it was
possible to do with digital communications what Osama bin Laden is now
reported to have done.

+++

The technical name for it is steganography, from the Greek for covered
writing. It is the art of keeping communications undetected, and it is not
to be confused with the related discipline of cryptography. Cryptography
assumes that messages will be intercepted and uses codes and ciphers to make
sure they can't be understood if they are. But steganography aims for a
deeper sort of cover: it assumes that if the message is so much as found to
exist, the game is over.

Steganographic techniques are as old, at least, as Herodotus, who documented
their use among the Greeks of the 5th century B.C. In Book Seven of _The
Histories_, he writes that when Demaratus, a Spartan living in Persia, got
wind of the emperor Xerxes' plan to invade Greece, he contrived to tip his
compatriots off by sending them a stegotext: he took a pair of folding
wooden message tablets, scraped the wax writing surface off them, wrote his
message on the wood, then covered his message back over with wax. Persian
counterintelligence never suspected a thing. Nor did the Persians have a
clue when Histiaeus of Miletus sent a similarly subversive letter home
tattooed onto the scalp of a trusted slave. The messenger arrived safely at
his destination and said no more than what he'd been instructed to say:
Shave my head and look thereon.

In contrast with cryptography, a field long given over to high math and
puzzle-making abstraction, steganography was always more or less a materials
science, its history florid with the range of substances and gadgetry used
at one time or another to conceal communications. Simon Singh's _The Code
Book_ relates that in the first century A.D., Pliny the Elder explained how
the milk of the thithymallus plant dried to transparency when applied to
paper but darkened to brown when subsequently heated, thus recording one of
the earliest recipes for invisible ink. The ancient Chinese wrote notes on
small pieces of silk that they then wadded into little balls and coated in
wax, to be swallowed by a messenger and retrieved, I guess, at the messenger
's gastrointestinal convenience. The 16th

Re: nettime Pirate Utopia, FEED, February 20, 2001

2001-09-20 Thread Grant Bayley


 --- begin forwarded text

 Status:  U
 From: Julian Dibbell [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Subject: nettime Pirate Utopia, FEED, February 20, 2001
 Date: Thu, 20 Sep 2001 08:37:20 -0500
 Sender: [EMAIL PROTECTED]
 Reply-To: Julian Dibbell [EMAIL PROTECTED]

 Key concepts: steganography, encryption, Osama bin Laden, intellectual
 property, temporary autonomous zone, pirates.

It's a shame that Niels Provos, one of the main developers of open-source
Steganography software at the moment wasn't able to detect a single piece
of information hidden steganographically in a recent survey of two million
images...  Sort of destroys the whole hype about the use of it by
criminals.   Details on the paper below:

Date: Sat, 15 Sep 2001 17:36:36 -0600
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Detecting Steganographic Content on the Internet

Detecting Steganographic Content on the Internet
Niels Provos and Peter Honeyman

Steganography is used to hide the occurrence of communication. Recent
suggestions in US newspapers indicate that terrorists use steganography to
communicate in secret with their accomplices. In particular, images on the
internet were mentioned as the communication medium. While the newspaper
articles sounded very dire, none substantiated these rumors. To determine
whether there is steganographic content on the Internet, this paper presents
a detection framework that includes tools to retrieve images from the world
wide web and automatically detects whether they might contain steganographic
content. To ascertain that hidden messages exist in images, the detection
framework includes a distributed computing framework for launching dictionary
attacks hosted on a cluster of loosely coupled workstations. We have analyzed
two million images downloaded from eBay actions but have not been able to
find a single hidden message.

http://www.citi.umich.edu/techreports/reports/citi-tr-01-11.pdf
http://www.citi.umich.edu/techreports/reports/citi-tr-01-11.ps.gz





-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: nettime Pirate Utopia, FEED, February 20, 2001

2001-09-20 Thread Adam Back

Also it's interesting to note that it appears from Niels Provos and
Peter Honeymans paper that none of the currently available stego
encoding programs are secure.  They have broken them all (at least I
recognise the main stego programs available in their list of systems
their tools can attack), and it appears that all of the stego encoders
are naive attempts.

So either the FBI and NSA are unaware of and lagging behind Provos
work and the media reports are unsubstantiated hype (images could
have contained stego content) designed to further alternative agendas
(nasty privacy software outlawing agendas, or perhaps pure media
originated hype).

Or, they found existing stego software and evidence of it's use on
seized equipment or even some 2nd generation, non-publicly available
stego software on seized equipment.

I rather doubt this second possibility as we've also seen reports that
the perpetrators didn't even use crypto.

Adam


On Fri, Sep 21, 2001 at 08:27:00AM +1000, Grant Bayley wrote:
 
 It's a shame that Niels Provos, one of the main developers of open-source
 Steganography software at the moment wasn't able to detect a single piece
 of information hidden steganographically in a recent survey of two million
 images...  Sort of destroys the whole hype about the use of it by
 criminals.   Details on the paper below:



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]