Cryptography Reference
In-Depth Information
jects, sort on this value to get the so-called “true order”, use the
reordering function to insert the data, and ship with this order.
Further Reading
Rennie deGraaf, John Aycock and Michael Jacobson add
some authentication to port knocking by mixing in stan-
dard authentication algorithms and public-key cryptogra-
phy. [dAJ05]
David Glaude and Didier Barzin created SteganoGifPalet-
teOrder which hides information in the permutation of
the colors in the GIF palette in the same manner as Gif-
Shuffle. They have a nice description of the algorithm. See
http:/users.skynet.be/glu/sgpo.htm
There's been a great deal of exploration of how to hide
basic information in TCP/IP protocols. (And much of this
applies to other network protocols because it relies upon
general weaknesses in exchanges.) See, for instance, work
by Joanna Rutkowska [Rut06],
Steven J. Murdoch and Stephen Lewis [ML05, Mur06], and
Eugene Tumoian and Maxim Anikeev. [TA05]
Mihir Bellare and Alexandra Boldyreva looked at the secu-
rity of chaffing and winnowing in [BB00b].
Search WWH ::




Custom Search