Encryption Key Distribution Applying Steganography
The quondam problem of key distribution for symmetric ciphers has been, and still is, an essential element of secure information communications. In this prop...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Saudi Arabia under the topic 'new zealand national cricket team vs west indies cricket team match scorecard'.
About this video
The quondam problem of key distribution for symmetric ciphers has been, and still is, an essential
element of secure information communications. In this proposed technique, we use ideas originated from
steganography to hide the encryption key in the transmitted cipher text itself. The method begins by dividing
the encryption key into an agreed-upon number of sub-keys. These sub-keys are concealed in the cipher
text using a set of locations, known only to the sender and the receiver, as a shared secret. Then one transmits
the resulting slightly longer message to the receiver where he or she can retrieve the key and decrypt the
original message. We conjecture that since the cipher text is a set of pseudo-random bits, embedding the
pseudo-random bits representing the key will not be traceable. The proposed approach is suitable for both
software and hardware implementations.
Video Information
Views
376
Total views since publication
Likes
1
User likes and reactions
Duration
0:41
Video length
Published
Sep 2, 2014
Release date
Quality
hd
Video definition