Eugene Leitl wrote,
> On Wed, 26 Sep 2001, Harvey Newstrom wrote:
>
> > I am not going to take the time required to break the encryption of
> > seshat1.jpg, seshat3.jpg, and seshat4.jpg to determine which is PGP
> > encrypted, which is otherwise encrypted, and which is random data.
>
> Um, you're joking, right? There is no other way to tell than the
> break the cryptosystem, which in this case means brute-forcing it.
I'm not joking. I'm really not going to take the time required to break the
encryption. :-)
> You did not extract the encrypted message. You've just shown
> you can tell there's a message in there
That was the whole point.
> We've hardly started yet. Next round will be large images of
> different sizes, levels of noise.
It should be harder, I agree. But impossible? Why do you believe this?
Just because the software vendor claims that their software is perfect? Or
have you actually done some research or mathematical calculations that lead
you to this conclusion?
-- Harvey Newstrom <www.HarveyNewstrom.com> Principal Security Consultant, Newstaff Inc. <www.Newstaff.com> Board of Directors, Extropy Institute <www.Extropy.org> Cofounder, Pro-Act <www.ProgressAction.org>
This archive was generated by hypermail 2b30 : Fri Oct 12 2001 - 14:40:58 MDT