Font Size: a A A

Research On Subliminal Channels And Closing Subliminal Channels

Posted on:2006-07-04Degree:MasterType:Thesis
Country:ChinaCandidate:S H LiFull Text:PDF
GTID:2168360152471673Subject:Cryptography
Abstract/Summary:PDF Full Text Request
In modern information-hiding technique, one of the most important branches is subliminal channel. This paper recalls the history and development, and analysis some typical and significant subliminal channels. The author model the wide-band subliminal channel in DSA.The article also introduces why the subliminal channels exist with the information theory. A subliminal channel based on ECDSA is designed and general analysis is presented. We live in the time of information now. It is of great importance to anyone that the information people transmit and receive is far away from danger. But lots of harmful information brings us either loss of our property or the security. To persons, the loss may mean some damage of the important documents. But it may bring dramatically tragedy to the nations. Information-hiding is such a type of technology that causes the damage of dangerous information more secrete difficult and unpredictable. The subliminal channels properly belong to this kind of technique. Thus, we should not only enable our encryption algorithm safer, but also forbid the dangerous messages. However if the method we closing the subliminal channel is not appropriate, the communicating system will be still unsafe and overload. Here, a new definition of closing subliminal channels is introduced. The author manages to separate the subliminal channels from the traditional information-hiding. Let us make clear about what kind of harmful information we can shut down in digital signatures. The essence of the subliminal channels is the randomness and privacy of the private keys. It's crucial to close the subliminal channels and judge whether the random numbers private keys are truly random. Thus two models to close the subliminal channels using the principle are presented, and then according the two models several plans that is used to close the subliminal are analyzed and devised.
Keywords/Search Tags:information-hiding, subliminal channels, digital signature, randomness, privacy
PDF Full Text Request
Related items