Skip to main content

Self-synchronized message randomization methods for subliminal channels

  • Session 11: Subliminal Channel
  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1334))

Abstract

When one transmits a secret message sequence on a random number type subliminal channel, he/she has to convert the secret message sequence into a (practically) indistinguishable random number sequence first, and then embeds it on a carrier sequence. Otherwise the carrier sequence could be distinguished from one that contains no secret message. If others can distinguish whether a secret message sequence is embedded in the carrier sequence, the carrier sequence cannot be a subliminal channel. That is, a converter to convert any message sequence into a (practically) indistinguishable one is required. Moreover in many applications of subliminal channels, the deconverter corresponding to the converter should be self-synchronized with the converted sequence, because additional information to synchronize reduces the indistinguishability. Therefore, both (practical) indistinguishability and self-synchronization are required to the converter for subliminal channels. Vernum encryption can convert any message sequences into perfectly indistinguishable random number sequences. However the receivers cannot decode the message sequences from anywhere of the converted sequences without any knowledge of the synchronization. On the contrary, (EBC), CBC, CFB mode block ciphers and self-synchronizing stream ciphers can realize the self-synchronization. However, most of the output sequences can be distinguished from real or well-designed random number sequences by using the birthday paradox distinguishers we propose in this paper under some conditions.

In this paper, we design some pairs of converters and deconverters that satisfy both (practical) indistinguishability and self-synchronization.

This is a preview of subscription content, log in via an institution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. B. Schneier. “Subliminal Channel”. In “Applied Cryptography, Second Edition”, pages 531–536. John Wiley & Sons, 1996.

    Google Scholar 

  2. G. J. Simmons. “Subliminal Channels: Past and Present”. European Trans. on Telecommunications, 4(4):459–473, Jul/Aug 1994.

    Google Scholar 

  3. Y. Desmedt, C. Goutier, and S. Bengio. “Special uses and abuses of the fiat-shamir passport”. In Proc. of CRYPTO '87, LNCS 293, pages 21–39. Springer-Verlag, 1997.

    Google Scholar 

  4. G. J. Simmons. “Subliminal communication is easy using the DSA”. In Proc. of EUROCRYPT '93, LNCS 765, pages 218–232. Springer-Verlag, 1994.

    Google Scholar 

  5. K. Kobara and H. Imai. “The capacity of a channel with a one-way function”. In Proc. of Japan-Korea Joint Workshop on Information Security and Cryptology (JW-ISC) '97,1997.

    Google Scholar 

  6. R. A. Rueppel. “Stream ciphers”. In Contemporary Cryptology, pages 65–134. IEEE Press, 1991.

    Google Scholar 

  7. R. A. Rueppel. “Analysis and Design of Stream Ciphers”. Springer-Verlag, 1986.

    Google Scholar 

  8. J. Daemen, R. Govaerts, and J. Vandewalle. “resynchronization weakness in synchronous stream ciphers”. In Proc. of EUROCRYPT '93, LNCS 765, pages 159–176. Springer-Verlag, 1993.

    Google Scholar 

  9. D. R. Stinson. “Cryptography, Theory and Practice”. CRC Press, 1995.

    Google Scholar 

  10. S. Kullback. “Statistical methods in crypianalysis ”. Aegean Park Press, 1976.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Yongfei Han Tatsuaki Okamoto Sihan Qing

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag

About this paper

Cite this paper

Kobara, K., Imai, H. (1997). Self-synchronized message randomization methods for subliminal channels. In: Han, Y., Okamoto, T., Qing, S. (eds) Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol 1334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028488

Download citation

  • DOI: https://doi.org/10.1007/BFb0028488

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63696-0

  • Online ISBN: 978-3-540-69628-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics