Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
0Activity
0 of .
Results for:
No results containing your search query
P. 1
Crypto Chronology 2

Crypto Chronology 2

Ratings: (0)|Views: 98|Likes:
Published by Hunter6677

More info:

Published by: Hunter6677 on Apr 29, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

04/29/2013

pdf

text

original

 
Bacon’s Bilateral Cipher (1561 – 1624)
Francis Bacon presented this example of a typeof 
steganography
(i.e., hiding the existenceof the message).Correspondents agree on an encoding of thealphabet.The plaintext is hidden in an innocuous mes-sage by the selection of a font using the letter
a
for, say, plain-face, and
b
for bold-face.See Figure 1.5 on page 13.
1
 
A aaaaaB aaaabC aaabaD aaabbE aabaaF aababG aabbaH aabbbI abaaaK abaabL ababaM ababbN abbaaO abbabP abbbaQ abbbbR baaaaS baaabT baabaV baabbW babaaX bababY babbaZ babbb
2
 
Example
: If the plaintext is
RHODES
and theinnocuous text isITS A BEAUTIFUL DAY IN THENEIGHBORHOODthen the message is hidden as
R H O D E S
baaaa aabbb abbab aaabb aabaa baaab
I
TSAB EA
UTI
F
UL
D
A
YIN
TH
EN
E
IG
H
BOR
H
When the proper spacing is put back in:
I
TS A BEA
UTI
F
UL
D
A
Y IN
TH
EN
E
IG
H
BOR
H
OOD
3

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->