Context based Entropy : How to use keyed-steganography

by Keith Makan
1 comment blog.k3170makan.com Encryption & Authentication

I have spoken to a couple of people about this idea, those who know a little bit about steg often tell me this idea is pretty cool so I'll make it a little more public, see who catches it and starts doing interesting things before i do. Not saying I came up with this first, totally happy to pass the torch if I am to do so. But I do believe this idea could revolutionize security, cryptography and introduce a level of steganography to communication channels that is as hard to break as a secret key is to guess. I believe this possibly because my faculty for reasoning is flawed OR I'm missing something about my construction (I'm not a cryptographer--not a qualified one at least I'm just a dude who thinks about things a lot and just so happens to work in information security).

http://blog.k3170makan.com/2017/08/context-based-entropy-how-to-use-keyed.html

Avatar
Steven Ulm 1 month, 3 weeks ago

Hard to make my head around this presentation. Good but...

Reply