Am 16.01.2017 um 00:55 schrieb Kevin:
An attacker could easily flip bits until the key is found. Also, what is the typical key length? Furthermore, couldn't an attacker get a hold of the software's dictionary?
I suppose you haven't closely examined what's stated in my software. The dictionary that is used is public. Depending upon a secret key, two separate lists of words are derived from that dictionary. Words in list0 implies 0, words in list1 implies 1. The user has to (with his ingenuity) formulate (with the guidance by the software) a covertext with appropriate words such that a given sequence of stegobits can be transmitted with it. For my personal conception of a suitable key, see the example given in the software. M. K. Shen _______________________________________________ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography