Re: Corrupting files

2006-06-13 Thread Johan Wevers
Atom Smasher wrote: >btw, what's the threat model where this is advantageous? I can imagine it might be used for plausible deniability: if some law enforcement agency would force you to decrypt the messsage, you could claim you can't and you didn't read it anyway because it's corrupted. Of cours

Re: Corrupting files

2006-06-13 Thread Ingo Klöcker
Am Dienstag, 13. Juni 2006 09:02 schrieb Samuel ]slund: > On Mon, Jun 12, 2006 at 11:55:54PM +0200, Ingo Klöcker wrote: > > No, it doesn't. You are still believing in security-by-obscurity > > meaning that your additional "encryption" only works as long as you > > and the recipient are the only one

Re: Corrupting files

2006-06-13 Thread Samuel ]slund
On Mon, Jun 12, 2006 at 11:55:54PM +0200, Ingo Klöcker wrote: > No, it doesn't. You are still believing in security-by-obscurity meaning > that your additional "encryption" only works as long as you and the > recipient are the only ones who know the secret rule. Please Ingo, _all_ encryption is

Re: Corrupting files

2006-06-12 Thread Ingo Klöcker
On Monday 12 June 2006 22:15, Tom Thekathyil wrote: > Hi Robert, > > Thanks for your response: that was for a trivial case :) > > Now let's try a curveball. We substitute lines 9 to 12 for the > equivalent _somewhere else_ in the code, so it won't be a simple > transform. This is based on a rule

Re: Corrupting files

2006-06-12 Thread Tom Thekathyil
Hi Robert, Thanks for your response: that was for a trivial case :) Now let's try a curveball. We substitute lines 9 to 12 for the equivalent _somewhere else_ in the code, so it won't be a simple transform. This is based on a rule that a message sent on the 12th day of June would have certain p

Re: Corrupting files

2006-06-12 Thread utternoncesense
If your modus operandi includes exchanging secret information outside of normal channels (e.g., "change the case of the nth letter") you would be better off exchanging more secure information than a single change like that. For example - a second set of public keys. Encyrpt your document twice,

Re: Corrupting files

2006-06-12 Thread zvrba
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 On Mon, Jun 12, 2006 at 08:36:54AM +0200, Remco Post wrote: > > Brute force... trying every possible key on a message until the > Brute force both in the key length and the size of the alphabet. > > decrypted message makes sense. Since in theory

Re: Corrupting files

2006-06-12 Thread Ingo Klöcker
Am Montag, 12. Juni 2006 04:42 schrieb Tom Thekathyil: > A wishes to send message to B. > > A encrypts message using B's key. Opens encrypted message and > corrupts the file by altering one or more characters/adding redundant > lines of code, e.g. changes case of first occurrence of 'T' in the > co

Re: Corrupting files

2006-06-12 Thread Remco Post
Tom Thekathyil wrote: > A wishes to send message to B. > In theory, any encrypted message is like completely random. > Question: Is there in theory any way of breaking the corrupted > encryption through brute force? > Brute force... trying every possible key on a message until the decrypted me

Re: Corrupting files

2006-06-12 Thread Atom Smasher
On Mon, 12 Jun 2006, Tom Thekathyil wrote: A wishes to send message to B. A encrypts message using B's key. Opens encrypted message and corrupts the file by altering one or more characters/adding redundant lines of code, e.g. changes case of first occurrence of 'T' in the code. Saves file an

Corrupting files

2006-06-11 Thread Tom Thekathyil
A wishes to send message to B. A encrypts message using B's key. Opens encrypted message and corrupts the file by altering one or more characters/adding redundant lines of code, e.g. changes case of first occurrence of 'T' in the code. Saves file and sends to B. B will get an error message when t