Am 16.01.2017 um 00:55 schrieb Kevin:
An attacker could easily flip bits until the key is found. Also, what
is the typical key length? Furthermore, couldn't an attacker get a hold
of the software's dictionary?
I suppose you haven't closely examined what's stated in my
software. The
An attacker could easily flip bits until the key is found. Also, what
is the typical key length? Furthermore, couldn't an attacker get a hold
of the software's dictionary?
On 1/15/2017 4:19 PM, mok-kong shen wrote:
WORDLISTTEXTSTEGANOGRAPHY is a new software (employing an extensive
WORDLISTTEXTSTEGANOGRAPHY is a new software (employing an extensive
English word list) which, while performing linguistic steganography,
also involves pseudo-random separation of the word list into two
sublists (for denoting 0 and 1 bits) that are dependent on dynamic
session-key materials, thus