Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
1Activity

Table Of Contents

Exploring the World of Covert Communication
What Is Steganography?
Where Hidden Data Hides
Where Did It Come From?
Where Is It Going?
When Steganography Inspires Terror
Who Is Using Stego?
Protecting Your Rights
Keeping Your Business Secure
Looking Ahead
Cryptography Defined
Crypto 101
Crypto Lingo
Early Cryptography
How We Got to Modern Cryptography
Cryptography and Network Security
Confidentiality
Integrity
Availability
Authentication and Non-Repudiation
Authentication
Non-repudiation
Principles of Cryptography
You Cannot Prove Crypto Is Secure
Algorithm versus Implementation
Never Trust Proprietary
The Strength of an Algorithm Is in the Key
Cryptography Stays in Place
Cryptography Must Be Designed In
All Cryptography Is Crackable, in Time
Security Becomes Obsolete
Types of Cryptography
Symmetric
Diffie-Hellman Key Exchange
Common Implementations of Symmetric Encryption
Asymmetric
Hash
Putting the Pieces Together
Using Cryptography Tools
Working with PGP
Generating a Privacy Key with PGP
How PGP Works with Email
Using SSH
Overview of Steganography
The Growth of Steganography
Steganography in Use
Flaws of Steganography
Variations on Stego
Trojan Horses
Covert Channels
Easter Eggs
Hardware Keys
Security and Steganography
Survivability
No Detection
Visibility
Principles of Steganography
Types of Steganography
File Type
Method of Hiding
Hands-on Steganography
Putting All the Pieces Together
What Is Digital Watermarking?
Exploring Uses for Digital Watermarking
Properties of Digital Watermarking
Types of Digital Watermarking
Invisible Watermarking
Visible Watermarking
Goals of Digital Watermarking
Digital Watermarking and Stego
Uses of Digital Watermarking
Removing Digital Watermarks
The Internet: A Climate for Deceit
The End of the Paper Trail
Your Jurisdiction or Mine?
Searching for Identity
Corporate Espionage
Who’s Playing?
Information Attacks
System Attacks
Playing Spy
Big Brother—With an Attitude
Information Crime and the Law
Who’s Watching Whom?
Protecting Ideas
Enforcement: A Tough Nut
The Challenge
Enforcing the Unenforceable
The Growing Science of Computer Forensics
Original Classification Scheme
Insertion-Based
Algorithmic-Based
Grammar-Based
New Classification Scheme
Substitution-Based
Generation-Based
Color Tables
Products That Implement Steganography
S-Tools
Using S-Tools with Image Files
Using S-Tools with Sound Files
S-Tools Step-by-Step
Hide and Seek
J-Steg
EZ Stego
Image Hide
Digital Picture Envelope
Camouflage
Gif Shuffle
Spam Mimic
Rolling Your Own Stego
Comprehensive Stego Program
Technique Structure
WAV Creation
Overview
Idea
Details
Logic Flow
Areas for Improvement
wav-Sine Creation
WAV Twiddle
Doc Stuffer
EXE Stuffer
HTML White Space
HTML White Space Variable
RTF Insertion
Uses and Techniques of Network Stego
Hiding in Network Traffic
Stego Combined with Viruses
Tracking Internet Usage
Network Stego Techniques
Hiding in an Attachment
Hiding Data in an Email Attachment
Transmitting Hidden Data with FTP
Posting Stego to a Web Site
Hiding in a Transmission
Using Invisible Secrets to Hide and Transmit Data
Embedding Hidden Data with Invisible Secrets
Decrypting and Extracting Data with Invisible Secrets
CameraShy
Hiding Data in Network Headers
Networking and TCP/IP: The Basics
Using IP and TCP Headers for Stego
Covert tcp
How Covert tcp Works
Running Covert tcp
Hiding in an Overt Protocol
Who’s Cracking What?
Cracking Analysis
Cryptanalysts
Steganalysts
The Role of Detection
Detecting Encryption
Randomness and Compression
Detection and Image Files
Building a Program for Detection
Cracking Cryptography
General Attacks
Ciphertext-Only Attack (COA)
Known Plaintext Attack (KPA)
Chosen Plaintext Attack (CTA)
Chosen Ciphertext Attack (CCA)
Specific Attacks
Brute-Force Attack
Replay Attack
Man-in-the-Middle Attack
Meet-in-the-Middle Attack
Birthday Attack
Cracking Steganography
Specific Techniques
S-Tools Version 4.0
StegDetect
General Techniques for Detecting Stego
Secure versus Secret
Setting Communication Goals
The Roles of Crypto and Stego in Business
Why You Need Both Stego and Crypto
Common Problems with Secure Technologies
Improving the Techniques
Improved Resistance to Analysis
How Much Can You Hide?
Improved Attack Tools
New and Improved Ways to Use Stego
Where Will Stego Tools Reside?
0 of .
Results for:
No results containing your search query
P. 1
Cole - Hiding in Plain Sight - Steganography and the Art of Covert Communication

Cole - Hiding in Plain Sight - Steganography and the Art of Covert Communication

Ratings: (0)|Views: 73|Likes:
Published by João Taborda

More info:

Published by: João Taborda on Oct 17, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

10/17/2011

pdf

text

original

You're Reading a Free Preview
Pages 8 to 239 are not shown in this preview.
You're Reading a Free Preview
Pages 247 to 255 are not shown in this preview.
You're Reading a Free Preview
Pages 268 to 339 are not shown in this preview.
You're Reading a Free Preview
Pages 347 to 361 are not shown in this preview.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->