Cryptography Reference
In-Depth Information
jects, sort on this value to get the so-called “true order”, use the
reordering function to insert the data, and ship with this order.
Further Reading
•
Rennie deGraaf, John Aycock and Michael Jacobson add
some authentication to port knocking by mixing in stan-
dard authentication algorithms and public-key cryptogra-
phy. [dAJ05]
•
David Glaude and Didier Barzin created SteganoGifPalet-
teOrder which hides information in the permutation of
the colors in the GIF palette in the same manner as Gif-
Shuffle. They have a nice description of the algorithm. See
http:/users.skynet.be/glu/sgpo.htm
•
There's been a great deal of exploration of how to hide
basic information in TCP/IP protocols. (And much of this
applies to other network protocols because it relies upon
general weaknesses in exchanges.) See, for instance, work
by Joanna Rutkowska [Rut06],
Steven J. Murdoch and Stephen Lewis [ML05, Mur06], and
Eugene Tumoian and Maxim Anikeev. [TA05]
•
Mihir Bellare and Alexandra Boldyreva looked at the secu-
rity of chaffing and winnowing in [BB00b].