[e-privacy] CRYPTO-GRAM, March 15, 2003 (fwd)

marcoc1 at dada.it marcoc1 at dada.it
Tue Mar 25 15:07:13 CET 2003


At 15.00 25/03/2003 +0100, you wrote:
>Date: Sat, 15 Mar 2003 03:29:28 -0600
>From: Bruce Schneier <schneier at counterpane.com>
>Subject: CRYPTO-GRAM, March 15, 2003
>
>                  CRYPTO-GRAM
>
>                 March 15, 2003
>
>               by Bruce Schneier
>                Founder and CTO
>       Counterpane Internet Security, Inc.
>            schneier at counterpane.com
>          <http://www.counterpane.com>
>
>
>A free monthly newsletter providing summaries, analyses, insights, and 
>commentaries on computer security and cryptography.
>
>[......]
>Steganography program hides data in executable code:
><http://www.securityfocus.com/news/2623>
>
>http://lists.firenze.linux.it/mailman/listinfo/e-privacy

concedes that the method is imperfect -- an application that's been impressed with a secret message has considerably more "negative subtractions" than an unadulterated program, making it easy to pick out through a statistical analysis. Hydan could also break programs that are self-modifying or employ other unconventional techniques. And it's less efficient than stego programs for image and sound files: good steganography for a JPEG file can hide one byte of storage in 17 bytes of image, while Hydan's ratio is one byte of storage to 150 bytes of code.

150:1 rapporto di utilizzo, e forse scassa il codice
 (quello MS o mac sicuro!)

Per ora non e' praticabile....  interessante pero'....


-- 
+     il  Progetto Freenet - segui il coniglio bianco        +
*     the Freenet  Project - follow the  white rabbit        *
*   Marco A. Calamari    marcoc at dada.it     www.marcoc.it    *
*     PGP RSA: ED84 3839 6C4D 3FFE 389F 209E 3128 5698       *
+ DSS/DH:  8F3E 5BAE 906F B416 9242 1C10 8661 24A9 BFCE 822B +
 




More information about the E-privacy mailing list