[e-privacy] CRYPTO-GRAM, March 15, 2003 (fwd)
marcoc1 at dada.it
marcoc1 at dada.it
Tue Mar 25 15:07:13 CET 2003
At 15.00 25/03/2003 +0100, you wrote:
>Date: Sat, 15 Mar 2003 03:29:28 -0600
>From: Bruce Schneier <schneier at counterpane.com>
>Subject: CRYPTO-GRAM, March 15, 2003
>
> CRYPTO-GRAM
>
> March 15, 2003
>
> by Bruce Schneier
> Founder and CTO
> Counterpane Internet Security, Inc.
> schneier at counterpane.com
> <http://www.counterpane.com>
>
>
>A free monthly newsletter providing summaries, analyses, insights, and
>commentaries on computer security and cryptography.
>
>[......]
>Steganography program hides data in executable code:
><http://www.securityfocus.com/news/2623>
>
>http://lists.firenze.linux.it/mailman/listinfo/e-privacy
concedes that the method is imperfect -- an application that's been impressed with a secret message has considerably more "negative subtractions" than an unadulterated program, making it easy to pick out through a statistical analysis. Hydan could also break programs that are self-modifying or employ other unconventional techniques. And it's less efficient than stego programs for image and sound files: good steganography for a JPEG file can hide one byte of storage in 17 bytes of image, while Hydan's ratio is one byte of storage to 150 bytes of code.
150:1 rapporto di utilizzo, e forse scassa il codice
(quello MS o mac sicuro!)
Per ora non e' praticabile.... interessante pero'....
--
+ il Progetto Freenet - segui il coniglio bianco +
* the Freenet Project - follow the white rabbit *
* Marco A. Calamari marcoc at dada.it www.marcoc.it *
* PGP RSA: ED84 3839 6C4D 3FFE 389F 209E 3128 5698 *
+ DSS/DH: 8F3E 5BAE 906F B416 9242 1C10 8661 24A9 BFCE 822B +
More information about the E-privacy
mailing list