Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Lecture 1
3 week summer course
Steganography
This is hidden writing or steganography.
Histaeus, ruler of Miletus, wanted to send a
message to his friend Aristagorus, urging
revolt against the Persians. Histaeus shaved
the head of his most trusted slave, then
tattooed a message on the slave's scalp.
After the hair grew back, the slave was sent
to Aristagorus with the message safely
hidden.
From http://www.strangehorizons.com/2001/20011008/steganography.shtml
Steganography
Other examples include
Steganography
In the 16th century, the Italian scientist Giovanni
Porta described how to conceal a message in a
hardboiled egg by making ink from alum and
vinegar and writing on the shell. The solution
penetrates the shell, leaving its mark only on
the egg underneath!
During WWII, German agents in Latin America
would photographically shrink down a page of
text to a little dot, and hide it on top of a
period or dotted I on a page. A tip-off allowed
American agents to find this in 1941.
Invisible Ink
During the American revolution, both sides
made extensive use of chemical inks that
required special developers to detect, though
the British had discovered the American
formula by 1777. Throughout World War II,
the two sides raced to create new secret inks
and to find developers for the ink of the
enemy. In the end, though, the volume of
communications rendered invisible ink
impractical.
From http://www.strangehorizons.com/2001/20011008/steganography.shtml
20 Century Steganography
th
21 Century Steganography
st
Spam-onography
The modern version of Trithemius' scheme is
undoubtedly SpamMimic. This simple system hides a
short text message in a letter that looks exactly like
spam, which is as ubiquitous on the Internet today as
innocent prayers were in the 16th century.
SpamMimic uses a "grammar" to make the messages.
For example, a simple sentence in English is
constructed with a subject, verb, and object, in that
order. Given lists of 26 subjects, 26 verbs, and 26
objects, we could construct a three word sentence
that encodes a three letter message. If you carefully
prescribe a set of rules, you can make a grammar that
describes spam.
From http://www.strangehorizons.com/2001/20011008/steganography.shtml
Websites of interest
Look at the steganography software at
http://wwwrn.inf.tu-dresden.de/~westfeld/f5.html
http://www.stegoarchive.com/
Invisible inks
lemon juice, milk, vinegar and onion juice
all work as secret inks that can be
revealed under heat.
Baking soda can be used, and then
painted over with purple grape juice to
reveal the color
Steganography
Steganography suffers
from one problem: if it is
uncovered all is lost.
Cryptography
Cryptography