Professional Documents
Culture Documents
18 December 2012
The broadband channel uses almost all available bits. Every channel, which uses
less bits, is called a narrow-band channel. The additionally used bits are needed for further protection, e.g., impersonation.
18 December 2012
Notes of Lecture 13
Algorithm of Subliminal Channel INPUT: An n-bit, two prime number P, q (secret), a Positive integer r such that GCD(r,p)=1 and GCD(r,p)=1. OUTPUT: Two sets of binary groups C1, C0 such that we Can choose one element from each set. (X1, X2). 1: Generate 2n bits 2: Divide 2n bits into two groups C0 which represent odd
18 December 2012
Algorithm of Subliminal Channel 3.1: Calculate the meaningful message according to the Following secret equation
3.2: Calculate the meaningful message according to the Following secret equation
3.3: Sift left x1 and X2 certain times according to the following formula: X11= (x1 shift left (r/n)),
Notes of Lecture 13
Example
The two authentic meaningful messages generated when n=3, p=11, q=17, and initial value of r=3 is as follows: The numbers of all possible
values are
000 001 010 011 100 101 110 111 The even bits C0 = 000 010 100 110 The odd bits C1 = 001 011 101 111 By applying equations (1) and (2) we get two meaningful messages which are x1=010 from set C0 and x2= 101fromset C1 which are in different
18 December 2012
Notes of Lecture 13
Example The selected meaningful messages are then coded by using biquinary code(5043210) as illustrated in table1
Decimal Representation The original codes(421) (biquinary)5043210
0 1 2 3
4 5
6 7
100 101
110 111
0110000 1000001
1000010 1000100
18 December 2012
Notes of Lecture 13
Applications of Subliminal Channel The most obvious application of the subliminal channel is in a spy network. If everyone sends and receives signed messages, spies will not be noticed sending subliminal messages in signed documents. Of course, the enemys spies can do the same thing. Using a subliminal channel, Alice could safely sign a document under threat. She would, when signing the document, imbed the subliminal message.
18 December 2012
Notes of Lecture 13
Notes of Lecture 13
Example of the Broadband Channel Step1: Set-Up We chose the primes p = 2347, q = 23 and the element z = 1979. It follows that the generator g= z^(p-1)/q mod p = 1979^102 mod 2347 =266 Publishing (p; q; g). We chose the primes p = 2347, q = 23 and the element z = 1979. Step 2: Key Generation We chose the authentication key x = 1468, so that the verification key Y=g^x mod p = 266^1468 mod 2347 = 2100. Publishing y. Step 3: Signing The message m is 1337 and as hash function we chose for simplicity a modulo reduction by 107. The message hash is then calculated as h=1337 mod 107 = 53. We chose randomly the session key k = 17 r = (g^k mod p) mod q = (266^17 mod 2347) mod 23 = 12 s = k^-1(h(m) + xr) mod q = 19(53 + 1468 12) mod 23 = 3 Sending the triple (m = 1337; r = 12; s = 3).
18 December 2012
Notes of Lecture 13
Example of the Broadband Channel Step 4: Verifying Receiving the triple (m = 1337; r = 12; s = 3). h=1337 mod 107 = 53
t=s^-1 mod q = 8
u1=ht mod q = 53 * 8 mod 23 = 10 u2=rt mod q = 12 * 8 mod 23 = 4 v = (g^u1*y^u2 mod p) mod q = (266^10*2100^4 mod 2347) mod 23 = 12 Since v = r it is accepted that the message was signed by the user,
18 December 2012
Notes of Lecture 13