Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Is it possible to build in a decoy? (Score 1) 814

Let's say i wanted to encrypt a jpeg

As I understand it, encryption works through software using a given algorithm to convert a given (readable) set of data to an unreadable form. The person encrypting has a key they could use to decrypt the data into a readable form.

Could software be written with the following functionality? I specify the jpeg I want to encrypt (say a picture of me in leather with a rose between my teeth which I use as my profile on a sadomasochism site), specify the encryption algoritm to use, specify the key, and lastly specify a decoy jpeg (say a pic of a rose).

The software then provides me with an encryped file which can be decoded to the original using the key I specified, and it also provides a key which, if used, will convert the encrypted file to the decoy jpeg.

User Journal

Journal Journal: Another day

Slashdot reports America is developing a Death Star, or some such thing. They're doing some space shit, involving ray guns and other funky stuff. Fascinating. Dubya loves his spaceships, don't he?

I see the future... The future is watching Robot Wars from Mars (now renamed the Lone Star Planet). A playpen for genetic mutants fashioned in a lab outside Earthly juristiction and suspicion, a cornucopia of corporate miscreance wrapped up in a bogus cloak of scientific respectability

Slashdot Top Deals

The flow chart is a most thoroughly oversold piece of program documentation. -- Frederick Brooks, "The Mythical Man Month"

Working...