Information hiding has several applications, one of which is to hide the use of cryptography. The Nicetext [5,6] system introduced a method for hiding cryptographic information by converting cryptographic strings (random-looking) into "nice text" (namely innocuous looking). The system retains the ability to recover the original ciphertext from the generated text. Nicetext can hide both plaintext and cryptographic text.The purpose of such transformations are to mask ciphertext from anyone who wants to detect or censor encrypted communication, such as a corporation that may monitor, or censor, its employee private mail. Even if the message is identified as the output of Nicetext, the sender might claim that the input was simply a pseudo-random number source rather than ciphertext.This paper extends the Nicetext protocol to enable deniable cryptography/ messaging using the concepts of plausible deniability [2,7]. Deniability is derived from the fact that even if one is forced to reveal a key to the random string that "nice text" reverts to, the real cryptographic/ plaintext messages may be stored within additional required sources of "randomness" in the extended protocol.
[1]
Mihir Bellare,et al.
The Security of Chaffing and Winnowing
,
2000,
ASIACRYPT.
[2]
Marc Rennhard,et al.
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography
,
2001,
ISC.
[3]
Markus G. Kuhn,et al.
Information hiding-a survey
,
1999,
Proc. IEEE.
[4]
Douglas Walton,et al.
Plausible deniability and evasion of burden of proof
,
1996
.
[5]
Bruce Schneier,et al.
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
,
1995
.
[6]
Ross J. Anderson,et al.
On the limits of steganography
,
1998,
IEEE J. Sel. Areas Commun..
[7]
Rafail Ostrovsky,et al.
Deniable Encryption
,
1997,
IACR Cryptol. ePrint Arch..
[8]
Mark Chapman,et al.
Hiding the Hidden: A software system for concealing ciphertext as innocuous text
,
1997,
ICICS.