首页 | 本学科首页   官方微博 | 高级检索  
     

一种基于对称加密和隐写术的反取证方法
引用本文:王灿,秦志光. 一种基于对称加密和隐写术的反取证方法[J]. 南京邮电学院学报(自然科学版), 2009, 0(3): 27-31
作者姓名:王灿  秦志光
作者单位:电子科技大学计算机科学与工程学院,四川成都610054
摘    要:提出了一种结合使用对称加密和隐写术的反取证方法。该方法用对称加密和异或运算对文件进行隐秘处理,较好地缓解了传统对称加密中短密钥便于记忆和长密钥更加安全之间的矛盾。在对称密钥泄露的情况下仍能保证隐秘文件的安全。该方法用低开销大幅度提高了破解难度,对隐写的载体文件没有特殊要求,适合在反取证环境中使用。根据此方法,开发了基于Windows平台的反取证原型工具Steg Encrypt,该命令行工具可用于使保存或传送的文件难以暴力破解。

关 键 词:反取证  对称加密  隐写术

An Anti-forensic Scheme Based on Symmetrical Encryption and Steganography
WANG Can,QIN Zhi-guang. An Anti-forensic Scheme Based on Symmetrical Encryption and Steganography[J]. Journal of Nanjing University of Posts and Telecommunications(Natural Science), 2009, 0(3): 27-31
Authors:WANG Can  QIN Zhi-guang
Affiliation:( School of Computer Science and Engineering, University of Electronic Science and Technology, Chengdu 610054, China)
Abstract:In this paper, a anti-forensic scheme based on symmetrical encryption and steganography is proposed. According to the scheme, the secret file is processed by the algorithm of symmetrical encryption and XOR, and it can not be reconstructed by the attacker even the symmetrical key is revealed. The contradiction between convenience of short key and security of long key, which exists in traditional symmetrical eneryption, is mitigated by the scheme. The difficulty of cracking is notably augmented with a low cost and there is no special requirement on the carrier files using in steganography. So the scheme is suitable for the application environment of anti-forensic. On the basis of the scheme, a prototype tool, which is called StegEncrypt, is developed in Windows platform. This command-line tool can be used to make it hard to decrypt the files, which are to be saved or transferred, by force.
Keywords:anti-forensic  symmetrical encryption  steganography
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号