用文字发布隐写术 [英] Issue Steganography with Text

查看:87
本文介绍了用文字发布隐写术的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我有一个关于密码学的项目.

我想用C#创建一个程序以将秘密密钥嵌入密文中,假设我已通过算法用密钥k加密为DES加密了密文c的消息,现在我想将密钥k插入密文c中,我的问题是:我不知道``不知道该使用哪种算法或技术,算法是随机插入还是逻辑技术,我的目的是中间人(actacker)无法理解包含密钥的密文中的密钥,当然程序允许获取密钥来自密文.

即:我有一个密钥8字节,密文128字节,程序将使用1字节密钥(128/8 = 16并基于大小密钥,密文插入)插入每16字节密文中,并且这种插入很容易被检测到通过统计方法,我需要一种智能算法来将密钥插入密文中,或者一种方法类似于隐写术,但载体是文本而不是图像.

我已经用Google搜索过,但是找不到解决方案或文档.

帮帮我,编辑->删除了电子邮件

I have a project about cryptography.

I want to create a program by C# to embed a secret key into ciphertext, suppose, i had encrypted message to ciphertext c by algorithm Encryption as DES with key k, now i want to insert key k into ciphertext c, my problem: i don''t know what algorithm or technical to do it, a algorithm random insertion or a logic technical, and my purpose is middle-man(actacker) can''t understand key in ciphertext which contained key, and of course program allows get key from keyed ciphertext.

i.e: i have a key 8 byte, a ciphertext 128 byte, program will insert into every 16 byte ciphertext with 1 byte key(128/8=16 and inserting base on size key, ciphertext) and this inserting is very easy to be detected by Statistics method, i need a smart algorithm to insert key into ciphertext, or a method is similar steganography but carrier is text instead image.

i have searched by google, but i don''t find solution or document.

help me, EDIT -> removed email

推荐答案

只需使用RSA(或某些其他公共密钥技术)来传输DES密钥.隐藏密钥的任何形式都是可以逆向工程的(它的默默无闻的安全性",众所周知这是行不通的:根据定义,该算法是可以解码的软件中提供的),并且如果有人在意的话,费力地尝试截取数据,他们将能够获得该软件的副本并查看其完成方式.

如果这是用于某种通信协议的,请查看我的套接字库中的密钥交换(在ServerRSAClientKey模式下).我不使用DES加密,但原理是相同的:一侧发送RSA公钥,另一侧选择对称加密密钥并用RSA密钥对其进行加密,然后将其发送(加密),然后发起方使用其RSA私钥以获取对称加密密钥.中间人只能看到RSA加密的密钥.
Just use RSA (or some other public key technology) to transmit the DES key. Any form of hiding the key is reverse engineerable (it''s ''security by obscurity'', which is well known not to work: the algorithm is by definition provided in the software that can decode it) and if anyone cares enough to bother trying to intercept the data they''ll be able to get a copy of the software and see how it''s done.

If this is for some sort of communication protocol, have a look at the key exchange in my sockets library (in ServerRSAClientKey mode). I don''t use DES encryption but the principle is the same: one side sends an RSA public key, the other side chooses a symmetric encryption key and encrypts it with the RSA key, sends it (encrypted) and the initiator decrypts it with its RSA private key to get the symmetric encryption key. All that a middle man can see is the RSA-encrypted key.


这篇关于用文字发布隐写术的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆