Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 1 declined, 1 accepted (2 total, 50.00% accepted)

Submission + - Distinguishing encrypted data from random data 5

gust5av writes: I'm working on a little script to provide _very_ simple and easy to use steganography. I'm using bash together with cryptsetup (without LUKS) and the plausable deniability lies in writing to different parts of a container file. On decryption you specify the offset of the hidden data. Together with a dynamically expanding filesystem this makes it possible to have an arbitrary number of hidden volumes in a file. It is implausible to reveal the encrypted data without the password, but is it possible to prove there is encrypted data where you claim there's not?

If I give someone one file containing random data and another containing data encrypted with AES, will he be able to tell which is which?

Slashdot Top Deals

It's great to be smart 'cause then you know stuff.

Working...