Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Subliminal channel

From Wikipedia, the free encyclopedia
Covert cryptographic channel
This article has multiple issues. Please helpimprove it or discuss these issues on thetalk page.(Learn how and when to remove these messages)
This article includes a list ofgeneral references, butit lacks sufficient correspondinginline citations. Please help toimprove this article byintroducing more precise citations.(November 2014) (Learn how and when to remove this message)
This articlemay beconfusing or unclear to readers. Please helpclarify the article. There might be a discussion about this onthe talk page.(November 2014) (Learn how and when to remove this message)
This articlemay be too technical for most readers to understand. Pleasehelp improve it tomake it understandable to non-experts, without removing the technical details.(September 2013) (Learn how and when to remove this message)
(Learn how and when to remove this message)

In cryptography,subliminal channels arecovert channels that can be used to communicate secretly in normal looking communication over aninsecure channel.[1] Subliminal channels indigital signature crypto systems were found in 1984 byGustavus Simmons.

Simmons describes how the "Prisoners' Problem" can be solved through parameter substitution indigital signature algorithms.[2][a]

Signature algorithms likeElGamal andDSA have parameters which must be set with random information. He shows how one can make use of these parameters to send a message subliminally. Because the algorithm's signature creation procedure is unchanged, the signature remains verifiable and indistinguishable from a normal signature. Therefore, it is hard to detect if the subliminal channel is used.

  • Subliminal channels can be classified into broadband and narrowband channel types.
  • Broadband and narrowband channels can exist in the same datastream.
  • The broadband channel uses almost all available bits that are available to use. This is commonly understood to mean {≥50% but ≤90%} channel utilization.
  • Every channel which uses fewer bits is called a narrow-band channel.
  • The additional used bits are needed for further protection, e.g.,impersonation.

The broadband and the narrow-band channels can use different algorithm parameters. A narrow-band channel cannot transport maximal information, but it can be used to send the authentication key or datastream.

Research is ongoing : further developments can enhance the subliminal channel, e.g., allow for establishing a broadband channel without the need to agree on an authentication key in advance. Other developments try to avoid the entire subliminal channel.

Examples

[edit]

An easy example of a narrowband subliminal channel for normal human-language text would be to define that an even word count in a sentence is associated with the bit "0" and an odd word count with the bit "1". The question "Hello, how do you do?" would therefore send the subliminal message "1".

TheDigital Signature Algorithm has one subliminal broadband[3] and three subliminal narrow-band channels[4]

At signing the parameterk{\displaystyle k} has to be set random. For the broadband channel this parameter is instead set with a subliminal messagem{\displaystyle m'}.

  1. Key generation
    1. choose primep=2347{\displaystyle p=2347}
    2. choose primeq=23{\displaystyle q=23}
    3. calculate generatorg=266{\displaystyle g=266}
    4. choose authentication keyx=1468{\displaystyle x=1468} and send it securely to the receiver
    5. calculate public keyy=gx{\displaystyle y=g^{x}} modp=2100{\displaystyle p=2100}
  2. Signing
    1. choose messagem=1337{\displaystyle m=1337}
    2. (hash functionH(m){\displaystyle H(m)} is here substituted with a modulo reduction by 107) calculate message hash valueh=m{\displaystyle h=m} modq=1337{\displaystyle q=1337} mod107=53{\displaystyle 107=53}
    3. instead of random valuek=?{\displaystyle k=?} subliminal messagem=17{\displaystyle m'=17} is chosen
    4. calculate inverse of the subliminal messagem1=19{\displaystyle m'^{-1}=19} mod23{\displaystyle 23}
    5. calculate signature valuer=(gk{\displaystyle r=(g^{k}} modp){\displaystyle p)} modq=(26617{\displaystyle q=(266^{17}} mod2347){\displaystyle 2347)} mod23=12{\displaystyle 23=12}
    6. calculate signature values=k1(h+xr){\displaystyle s=k^{-1}*(h+x*r)} modq=19(53+146812){\displaystyle q=19*(53+1468*12)} mod23=3{\displaystyle 23=3}
    7. sending message with signature triple(1337;12,3){\displaystyle (1337;12,3)}
  3. Verifying
    1. receiver gets message triple(m;r,s)=(1337;12,3){\displaystyle (m;r,s)=(1337;12,3)}
    2. calculate message hashh=H(m){\displaystyle h=H(m)} modq=1337{\displaystyle q=1337} mod107=53{\displaystyle 107=53}
    3. calculate inversew=s1{\displaystyle w=s^{-1}} modq=8{\displaystyle q=8}
    4. calculateu1=(hw){\displaystyle u_{1}=(h*w)} modq=538{\displaystyle q=53*8} mod23=10{\displaystyle 23=10}
    5. calculateu2=(rw){\displaystyle u_{2}=(r*w)} modq=128{\displaystyle q=12*8} mod23=4{\displaystyle 23=4}
    6. calculate signaturev=(gu1yu2{\displaystyle v=(g^{u_{1}}*y^{u_{2}}} modp){\displaystyle p)} modq=(2661021004{\displaystyle q=(266^{10}*2100^{4}} mod2347){\displaystyle 2347)} mod23=12{\displaystyle 23=12}
    7. sincev=r{\displaystyle v=r}, the signature is valid
  4. Message extraction on receiver side
    1. from triple (1337; 12, 3)
    2. extract messagem=8(53+146812){\displaystyle m'=8*(53+1468*12)} mod23=17{\displaystyle 23=17}

The formula for message extraction is derived by transposing the signature values{\displaystyle s} calculation formula.

Example: Using a Modulus n = pqr

[edit]

In this example, an RSA modulus purporting to be of the form n = pq is actually of the form n = pqr, for primes p, q, and r. Calculation shows that exactly one extra bit can be hidden in the digitally signed message. The cure for this was found by cryptologists at theCentrum Wiskunde & Informatica inAmsterdam, who developed aZero-knowledge proof that n is of the form n = pq.[citation needed] This example was motivated in part byThe Empty Silo Proposal.

Example - RSA Case study

[edit]

Here is a (real, working) PGP public key (using the RSA algorithm), which was generated to include two subliminal channels - the first is the "key ID", which should normally be random hex, but below is "covertly" modified to read "C0DED00D". The second is thebase64 representation of the public key - again, supposed to be all random gibberish, but the English-readable message "//This+is+Christopher+Drakes+PGP+public+key//Who/What+is+watcHIng+you//" has been inserted. Adding both these subliminal messages was accomplished by tampering with the random number generation during the RSAkey generation phase.

 PGP Key. RSA 2020/C0DED00D   Fprint: 250A 7E38 9A1F 8A86  0811 C704 AF21 222C  -----BEGIN PGP PUBLIC KEY BLOCK----- Version: Private  mQESAgAAAAAAAAEH5Ar//This+is+Christopher+Drakes+PGP+public+key// Who/What+is+watcHIng+you//Di0nAraP+Ebz+iq83gCa06rGL4+hc9Gdsq667x 8FrpohTQzOlMF1Mj6aHeH2iy7+OcN7lL0tCJuvVGZ5lQxVAjhX8Lc98XjLm3vr1w ZBa9slDAvv98rJ8+8YGQQPJsQKq3L3rN9kabusMs0ZMuJQdOX3eBRdmurtGlQ6AQ AfjzUm8z5/2w0sYLc2g+aIlRkedDJWAFeJwAVENaY0LfkD3qpPFIhALN5MEWzdHt Apc0WrnjJDby5oPz1DXxg6jaHD/WD8De0A0ARRAAAAAAAAAAAbQvQ2hyaXN0b3Bo ZXIgRHJha2UgPENocmlzdG9waGVyLkRyYWtlQFBvQm94LmNvbT60SE5ldFNhZmUg c2VjdXJpdHkgc29mdHdhcmUgZGlyZWN0b3IgQ2hyaXN0b3BoZXIgRHJha2UgPE5l dFNhZmVAUG9Cb3guY29tPokBEgMFEDPXgvkcP9YPwN7QDQEB25oH4wWEhg9cBshB i6l17fJRqIJpXKAz4Zt0CfAfXphRGXC7wC9bCYzpHZSerOi1pd3TpHWyGX3HjGEP 6hyPfMldN/sm5MzOqgFc2pO5Ke5ukfgxI05NI0+OKrfc5NQnDOBHcm47EkK9TsnM c3Gz7HlWcHL6llRFwk75TWwSTVbfURbXKx4sC+nNExW7oJRKqpuN0JZxQxZaELdg 9wtdArqW/SY7jXQn//YJV/kftKvFrA24UYLxvGOXfZXpP7Gl2CGkDI6fzism75ya xSAgn9B7BqQ4BLY5Vn+viS++6Rdavykyd8j9sDAK+oPz/qRtYJrMvTqBErN4C5uA IV88P1U= =/BRt -----END PGP PUBLIC KEY BLOCK-----

Improvements

[edit]

A modification to theBrickell and DeLaurentis signature scheme provides a broadband channel without the necessity to share the authentication key.[5]TheNewton channel is not a subliminal channel, but it can be viewed as an enhancement.[6]

Countermeasures

[edit]

With the help of thezero-knowledge proof and thecommitment scheme it is possible to prevent the usage of the subliminal channel.[7][8]

It should be mentioned that this countermeasure has a 1-bit subliminal channel. The reason for that is the problem that a proof can succeed or purposely fail.[9]

Another countermeasure can detect, but not prevent, the subliminal usage of the randomness.[10]

Notes

[edit]
  1. ^Simmons' Prisoners' Problem is not the same as thePrisoner's Dilemma.[1]

References

[edit]
  1. ^abGustavus J. Simmons.The Prisoners Problem and the Subliminal Channel. In Advances in Cryptology – CRYPTO ’83, pages 51–67, New York, 1984. Lecture Notes in Computer Science, ed. D. Chaum.
  2. ^Gustavus J. Simmons.The subliminal channel and digital signatures. In Proc. of the EUROCRYPT 84 workshop on Advances in Cryptology – theory and application of cryptographic techniques, pages 364–378, New York, NY, USA, 1985. Springer-Verlag New York, Inc.doi:10.1007/3-540-39757-4_25
  3. ^Gustavus J. Simmons.Subliminal communication is easy using the DSA. In EUROCRYPT ’93: Workshop on the theory and application of cryptographic techniques on Advances in cryptology, pages 218–232, Secaucus, NJ, USA, 1994. Springer-Verlag New York, Inc.
  4. ^Gustavus J. Simmons. The subliminal channel in the U.S. Digital Signature Algorithm (DSA), inProceedings of the 3rd Symposium on State and Progress of Research in Cryptography (SPRC '93), Rome, Italy, February 15–16, 1993.
  5. ^Gustavus J. Simmons.A Secure Subliminal Channel (?). In CRYPTO ’85: Advances in Cryptology, pages 33–41, London, UK, 1986. Springer-Verlag.
  6. ^Ross J. Anderson, Serge Vaudenay, Bart Preneel, and Kaisa Nyberg.The Newton Channel. In Proceedings of the First International Workshop on Information Hiding, pages 151–156, London, UK, 1996. Springer-Verlag.
  7. ^Yvo Desmedt.Abuses in Cryptography and How to Fight Them. In CRYPTO ’88: Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology, pages 375–389, London, UK, 1990. Springer-Verlag.
  8. ^Yvo Desmedt."Subliminal-free authentication and signature".p. 24 ofChristoph G. Günther, editor."Advances in Cryptology - EUROCRYPT '88".1988.
  9. ^Desmedt, Yvo (1996). "Simmons' Protocol is Not Free of Subliminal Channels".Proc. of 9th IEEE Computer Security Foundations Workshop. pp. 170–175.CiteSeerX 10.1.1.56.4816.
  10. ^Choi, Jong Youl; Golle, Philippe; Jakobsson, Markus (2006). "Tamper Evident Digital Signatures: Protecting Certification Authorities Against Malware".Proceedings of the 2nd IEEE International Symposium on Dependable Autonomic and Secure Computing.CiteSeerX 10.1.1.61.9340.
  • Bruce Schneier.Applied Cryptography, Second Edition: Protocols, Algorithms, and Source Code in C, 2. Ed. Wiley Computer Publishing, John Wiley & Sons, Inc., 1995.

External links

[edit]
Retrieved from "https://en.wikipedia.org/w/index.php?title=Subliminal_channel&oldid=1321388846"
Category:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp