Encryption Key Distribution Applying Steganography

The quondam problem of key distribution for symmetric ciphers has been, and still is, an essential element of secure information communications. In this prop...

Magdy Saeb376 views0:41

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Saudi Arabia under the topic 'new zealand national cricket team vs west indies cricket team match scorecard'.

About this video

The quondam problem of key distribution for symmetric ciphers has been, and still is, an essential element of secure information communications. In this proposed technique, we use ideas originated from steganography to hide the encryption key in the transmitted cipher text itself. The method begins by dividing the encryption key into an agreed-upon number of sub-keys. These sub-keys are concealed in the cipher text using a set of locations, known only to the sender and the receiver, as a shared secret. Then one transmits the resulting slightly longer message to the receiver where he or she can retrieve the key and decrypt the original message. We conjecture that since the cipher text is a set of pseudo-random bits, embedding the pseudo-random bits representing the key will not be traceable. The proposed approach is suitable for both software and hardware implementations.

Video Information

Views
376

Total views since publication

Likes
1

User likes and reactions

Duration
0:41

Video length

Published
Sep 2, 2014

Release date

Quality
hd

Video definition