Title: General
1Information Hiding
CS 6262 Fall 02
2Lecture Notes from Julie M. Starr on Passing
Information Covertly
3Outline
- Steganography
- Covert Channels
- Information Leakage
4Prisoners Dilemma
- How do two prisoners communicate when all
messages are passed through the warden? - Cant use just encryption
- Must make message seem innocuous
- Prearrange scheme
5Steganography
6Steganography
- Encryption hides the content of a message, but
not the EXISTENCE of a message - Steganography hides data where it is not expected
- Communications is only known to cooperating
parties - Combine encryption steganography for secured
covert messaging - Might not raise as much suspicion as an encrypted
message
7Examples
- Invisible Ink
- Some ancient societies known to pass messages
covered in wax and swallowed - Shave a persons head, tattoo message and wait
until hair grew - Apparently neutrals protest is thoroughly
discounted and ignored. Isman hard hit. Blockade
issue affects pretext for embargo on by-products,
ejecting suets and vegetable oils.
Apparently neutrals protest is thoroughly
discounted and ignored. Isman hard hit. Blockade
issue affects pretext for embargo on by-products,
ejecting suets and vegetable oils.
Pershing sails from NY June 1
8Examples (contd)
- Microdots by Germans in WWII
- Photo of a message cemented to a period . on a
cover-text carrier message - Only discovered when a double agent tipped off
the FBI - TCP headers
- Picture files
- Audio files
- Web pages
9Messages in Pictures
- Lossless compression
- GIF, BMP
- Lossy compression
- JPEG
- Some stored as 8 or 24 bit images
- Red, Green, Blue
- FF FF FF, 255 255 255, 11111111 11111111 11111111
- White
- B/W
- One 8 bit number to choose from 256 shades of grey
10Messages in Pictures
- Cover-image
- Innocent file youll be piggybacking
- Stego-image
- Combined cover image with your data
- Data can be encrypted, a file, audio, another
picture - Stego-key
- Similar to a password, may help in extracting the
data from the stego-image
11S-Tools
http//www.cs.vu.nl/ast/books/mos2/zebras.html
12Messages in Pictures
- Bad cover image choices
- Snowstorm in Antartica
- Night picture in the country w/ a new moon
- Good choice
- Lots of variations, colors
- Options
- Every bit
- Selectively choose which bits to add data to
13Picture Techniques
- Least Significant Bit (LSB) Insertion
- Original 3 pixels (9 bytes)
- (1101101 00100100 101000011)
- (0001111 00101101 111011111)
- (0000111 00100111 100000111)
- 8-bit message 10010111
- New message
- (1101101 00100100 101000010)
- (0001111 00101100 111011111)
- (0000111 00100111 100000111)
14LSB Insertion
- About ½ of bits will need to be changed
- If using LSB or second LSB, not discernable to
human eye - If BMP or GIF converted to JPEG and back, secret
data will be lost - Could also insert noise, modify properties such
as luminance
15Pictures
- JPEG-Steg
- JPEG used discrete cosine transform to achieve
compression - Combines data cover image and produces lossy
stego-image JPEG through JPEG compression - In general secret messages may be altered if
stego-image is cropped or touched up
16More Picture Schemes
- Scheme by Israeli researchers works on printed
versions
17Other Mediums
- Audio - Add small echoes, not detected by human
ear if higher amplitude signal is in original
spot
18Steganalysis
- Hard to discover
- Designed to slip under the radar
- Use information theory to discover
- Unusual patterns
- Dont use 5 meg pictures files, not a standard
picture on the Internet - Some users insert PGP messages into cover images
- Harder to detect if PGP headers are stripped
- Obvious PGP header would signal existence of a
message to steganalysist
19Watermarking
- Similar to steganography in pictures, but
different intent - Want people to see marks
20Implications
- How can government/FBI demand the encryption keys
to your data when they dont even know youve got
information encrypted?
21Covert Channels
22Covert Channels
- Similar to steganography, but message is not
necessarily delivered individually - Shared medium exists for information to be passed
- Mechanism not designed for communication but
abused to be
23Examples
- Clinton wearing a special tie to send a message
to Monica - X-Files, masking tape X on window
- al Qaeda videotapes?
- At a brokerage house, passing on inside trading
information - Programmer could subtly alter how information is
displayed in reports, website to alter parties
when to sell - Just need something out of place but not obvious
24Govt Definitions
- Covert Channel
- A communications channel that allows a process to
transfer information in a manner that violates
the systems security policy - Covert Storage Channel
- CC using direct or indirect writing to a storage
location - Files, file locks
- Presences or absence of items
- Covert Timing Channel
- CC where a process manipulates system resources
to pass information to another process - CPU time, disk space shared resource is time
- Using or not using
25SW Controls
- Keep an eye on developers
- Peer code/design reviews
- Code walk-through
- Software Engineering practices
26Is there a problem?
- Relatively low transmission rate for
steganography and covert channels - May need a Trojan horse program for a covert
channel - Trojan horse program given with no ill intent
but is actually malicious - Demonstrated in labs, but doe they exist in the
real world? - Bob Morris Sr. was asked if CC were really in the
wild - Answer was Yes
27Information Leakage
28Information Leakage
- Not a prearranged covert channel, but user
inadvertently make information available - LED status lights can leak information
- Modems, routers, hard drives
- Emissions from computer monitors
- Emsec, Emissions Security
- Power consumption
- smartcards
29Original
http//www.cl.cam.ac.uk/mgk25/ieee02-optical.pdf
30Eavesdropped Processed
31Emissions Security
- Dont want computers RF signals given off in
normal operation to give info to opponents - Related to EMC RFI
- Electromagnetic compatibility, Radio Frequency
Inteference - Jamming
- Tempest Virus
- Infect computer turn it into a small radio
transmitter
32Tempest Radio
http//www.erikyyy.de/tempest/
33EmSec Threat?
- Government
- Real threat, embassies abroad
- Hidden microphones
- Business
- Not as important, unless is used against key
product such as smartcard - Easier ways to do industrial espionage
- Cable TV
- EmSec Controls
- Shielding