Stealthy Ciphertext

نویسندگان

  • Martina Simova
  • Mark Stamp
  • Chris Pollett
چکیده

To insure the confidentiality of data, it can be encrypted before it is transmitted. However, most data today is unencrypted. As a result, encrypted data might attract unwanted attention, simply due to the fact that it is encrypted. To avoid such attention, we propose a method of converting ciphertext into data that can pass certain automated tests for English text. Our goal is to foil automated detection methods, and we want to expand the encrypted data as little as possible in the process. Our technique can be considered as a form of steganography.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimum Stealthy Aircraft Detection Using a Multistatic Radar Hassan

Radar systems, based on Multistatic radar concept attracted a substantial attention in the recent years. The paper proposes system geometry for S-band Multistatic radar. This technique is used for detecting and tracking the small cross section area and stealthy aircrafts. The proposed geometrical structures are studied with different radars spacing to extend the detection coverage over the Mono...

متن کامل

Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud

Cloud computing, with the paradigm of computing as a utility, has the potential to significantly tranform the IT industry. Attracted by the high efficiency, low cost, and great flexibility of cloud, enterprises began to migrate large parts of their networks into cloud. The cloud becomes a public space where multiple “tenants” reside. Except for some public services, the enterprise networks in c...

متن کامل

Accurate Multistatic Radar Stealthy Aircraft Detection Using Monte-Carlo Simulation

IJSER © 2014 http://www.ijser.org Abstract— In this paper a system geometry with two transmitters and six receivers is used to extends the radar stealthy aircraft detection . Monte-Calro simulation for the stealthy aircraft RCS is used from accurate RCS estimation in the literature [1]. Radar systems, based on Multistatic radar concept attracted a substantial attention in the recent years. The ...

متن کامل

Practical Automated Detection of Stealthy Portscans

Portscan detectors in network intrusion detection products are easy to evade. They classify a portscan as more than N distinct probes within M seconds from a single source. This paper begins with an analysis of the scan detection problem, and then presents Spice (Stealthy Probing and Intrusion Correlation Engine), a portscan detector that is effective against stealthy scans yet operationally pr...

متن کامل

Can exotic disordered "stealthy" particle configurations tolerate arbitrarily large holes?

The probability of finding a spherical cavity or "hole" of arbitrarily large size in typical disordered many-particle systems in the infinite-system-size limit (e.g., equilibrium liquid states) is non-zero. Such "hole" statistics are intimately linked to the thermodynamic and nonequilibrium physical properties of the system. Disordered "stealthy" many-particle configurations in d-dimensional Eu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005