or
or
By clicking below, you agree to our terms of service.
New to HackMD? Sign up
Syntax | Example | Reference | |
---|---|---|---|
# Header | Header | 基本排版 | |
- Unordered List |
|
||
1. Ordered List |
|
||
- [ ] Todo List |
|
||
> Blockquote | Blockquote |
||
**Bold font** | Bold font | ||
*Italics font* | Italics font | ||
~~Strikethrough~~ | |||
19^th^ | 19th | ||
H~2~O | H2O | ||
++Inserted text++ | Inserted text | ||
==Marked text== | Marked text | ||
[link text](https:// "title") | Link | ||
 | Image | ||
`Code` | Code |
在筆記中貼入程式碼 | |
```javascript var i = 0; ``` |
|
||
:smile: | ![]() |
Emoji list | |
{%youtube youtube_id %} | Externals | ||
$L^aT_eX$ | LaTeX | ||
:::info This is a alert area. ::: |
This is a alert area. |
On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?
Please give us some advice and help us improve HackMD.
Do you want to remove this version name and description?
Syncing
xxxxxxxxxx
Chapter 14: Other Advanced Crypto Applications
From THE CYPHERNOMICON
14. Other Advanced Crypto Applications
14.1. copyright
THE CYPHERNOMICON: Cypherpunks FAQ and More, Version 0.666, 1994-09-10, Copyright Timothy C. May. All rights reserved. See the detailed disclaimer. Use short sections under "fair use" provisions, with appropriate credit, but don't put your name on my words.
14.2. SUMMARY: Other Advanced Crypto Applications
14.2.1. Main Points
14.2.2. Connections to Other Sections
14.2.3. Where to Find Additional Information
14.2.4. Miscellaneous Comments
14.3. Digital Timestamping
14.3.1. digital timestamping
In their parlance, such an ad is a "widely witnessed event," and attempts to alter all or even many copies of the newspaper would be very difficult and expensive. (In a sense, this WWE is similar to the "beacon" term Eric Hughes used.)
Haber and Stornetta plan some sort of commercial operation to do this.
This service has not yet been tested in court, so far as I know. The MIT server is an experiment, and is probably useful for experimenting. But it is undoubtedly even less legally significant, of course.
14.3.2. my summary
14.4. Voting
14.4.1. fraud, is-a-person, forging identies, increased "number" trends
14.4.2. costs also high
14.4.3. Chaum
14.4.4. voting isomorphic to digital money
14.5. Timed-Release Crypto
14.5.1. "Can anything like a "cryptographic time capsule" be built?"
the idea here of encrypting with a public key and requiring factoring of the modulus to decrypt. But the author had more techniques he used, iterating functions forward which would take longer to iterate backwards. The purpose was to give a more predictable time to decrypt…One problem with this
is that it does not so much put a time floor on the decryption, but rather a cost floor. Someone who is willing to spend enough can decrypt faster than someone who spends less. Another problem is the difficulty of forecasting the growth of computational power per dollar in the future." [Hal Finney, sci.crypt, 1994-8-04]
14.5.2. Needs
14.5.3. How
14.6. Traffic Analysis
14.6.1. digital form, and headers, LEAF fields, etc., make it vastly easier to know who has called whom, for how long, etc.
14.6.2. (esp. in contrast to purely analog systems)
14.7. Steganography
14.7.1. (Another one of the topics that gets a lot of posts)
14.7.2. Hiding messages in other messages
"Steganography should be used with a "stealthy" cryptosystem (secret key or public key), one in which the cyphertext is indistinguishable from a random bit string.
You would not want it to have any headers which could be used to confirm that a desteganized message was other than random noise." [Hal Finney, 1993-05-25]
14.7.3. Peter Wayner's "Mimic"
14.7.4. I described it in 1988 or 89 and many times since
A 2-hour DAT contains about 10 Gbits (2 hours x 3600 sec/hr x 2 channels x 16 bits/sample x 44K samples/sec), or about 1.2 Gbytes. A CD contains about half this, i.e., about 700 Mbytes. The LSB of a DAT is 1/16th of the 1.2 Gbytes, or 80 Mbytes. This is a lot of storage!
A home-recorded DAT–and I use a Sony D-3 DAT Walkman to make tapes–has so much noise down at the LSB level–noise from the A/D and D/A converters, noise from the microphones (if any), etc.–that the bits are essentially random at this level. (This is a subtle, but important, point: a factory recorded DAT or CD will have predetermined bits at all levels, i.e., the authorities could in principle spot any modifications. But home-recorded, or dubbed, DATs will of course not be subject to this kind of analysis.) Some care might be taken to ensure that the statistical properties of the signal bits resemble what would be expected with "noise" bits, but this will be a minor hurdle.
Adobe Photoshop can be used to easily place message bits in the "noise" that dominates things down at the LSB level. The resulting GIF can then be posted to UseNet or e-mailed. Ditto for sound samples, using the ideas I just described (but typically requiring sound sampling boards, etc.). I've done some experiments along these lines.
This doesn't mean our problems are solved, of course. Exchanging tapes is cumbersome and vulnerable to stings. But it does help to point out the utter futility of trying to stop the flow of bits.
14.7.5. Stego, other versions
mac archives.
14.7.6. WNSTORM, Arsen Ray Arachelian
14.7.7. talk about it being used to "watermark" images
14.7.8. Crypto and steganography used to plant false and misleading nuclear information
encrypted and stegonagraphied for authenticity. We were told that they were turned loose on the market for this product in other countries." [John Young, 1994-08-25]
14.7.9. Postscript steganography
14.8. Hiding cyphertext
14.8.1. "Ciphertext can be "uncompressed" to impose desired statistical properties. A non-adaptive first-order arithmetic decompression will generate first-order symbol frequencies that emulate, for instance, English text." [Rick F. Hoselton, sci.crypt, 1994-07-05]
14.9. 'What are tamper-responding or tamper-resistant modules?"
14.9.1. The more modern name for what used to be called "tamper-proof boxes"
14.9.2. Uses:
14.9.3. Bypassing tamper-responding or tamper-resistant technologies
14.10. Whistleblowing
14.10.1. This was an early proposed use (my comments on it go back to 1988 at least), and resulted in the creation of alt.whisteblowers.
14.10.2. outing the secret agents of a country, by posting them anonymously to a world-wide Net distribution…that ought to
14.11. Digital Confessionals
14.11.1. religious confessionals and consultations mediated by digital links…very hard for U.S. government to gain access
14.11.2. ditto for attorney-client conversations, for sessions with psychiatrists and doctors, etc.
14.11.3. (this does not meen these meetings are exempt from the law…witness Feds going after tainted legal fees, and bugging offices of attorneys suspected of being in the drug business)
14.12. Loose Ends
14.12.1. Feigenbaum's "Computing with Encrypted Instances" work…links to Eric Hughes's "encrypted open books" ideas.
Chapter 15: Reputations and Credentials