Team for Research in
Ubiquitous Secure Technology

Stealthy ciphertext
Mark Stamp, Martina Simova

Citation
Mark Stamp, Martina Simova. "Stealthy ciphertext". Proceedings of 3rd International Conference on Internet Computing (ICOMP'05), 2005.

Abstract
To ensure the confidentiality of data, it can be encrypted before it is transmitted. However, most data today is unencrypted. As a result, encrypted data might attract unwanted attention, simply due to the fact that it is encrypted. To avoid such attention, we propose a method of converting ciphertext into data that can pass certain automated tests for English text. Our goal is to foil automated detection methods, and we want to expand the encrypted data as little as possible in the process. Our technique can be considered as a form of steganography.

Electronic downloads


(No downloads are available for this publication.)
Citation formats  
  • HTML
    Mark Stamp, Martina Simova. <a
    href="http://www.truststc.org/pubs/428.html"
    >Stealthy ciphertext</a>, Proceedings of 3rd
    International Conference on Internet Computing (ICOMP'05),
    2005.
  • Plain text
    Mark Stamp, Martina Simova. "Stealthy ciphertext".
    Proceedings of 3rd International Conference on Internet
    Computing (ICOMP'05), 2005.
  • BibTeX
    @inproceedings{StampSimova05_StealthyCiphertext,
        author = {Mark Stamp and Martina Simova},
        title = {Stealthy ciphertext},
        booktitle = {Proceedings of 3rd International Conference on
                  Internet Computing (ICOMP'05)},
        year = {2005},
        abstract = {To ensure the confidentiality of data, it can be
                  encrypted before it is transmitted. However, most
                  data today is unencrypted. As a result, encrypted
                  data might attract unwanted attention, simply due
                  to the fact that it is encrypted. To avoid such
                  attention, we propose a method of converting
                  ciphertext into data that can pass certain
                  automated tests for English text. Our goal is to
                  foil automated detection methods, and we want to
                  expand the encrypted data as little as possible in
                  the process. Our technique can be considered as a
                  form of steganography.},
        URL = {http://www.truststc.org/pubs/428.html}
    }
    

Posted by Mark Stamp on 18 Aug 2008.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.