APC Australia

Hiding keyfiles in images

Steganogra­phy is a process of hiding informatio­n such as messages, files and images in other files or images.

-

The advantage of using Steganogra­phy is that it’s nigh-on impossible to tell if any image or file holds secret informatio­n. Compare this with regular cryptograp­hy, such as the one deployed with Tomb to create the keyfile. Due to its very name, having a .key extension, the keyfiles can easily be identified, and subjected to attacks such as brute force to break their password protection.

Wouldn’t it be great if you could mask your keyfiles within seemingly benign files? Thankfully, Tomb makes it quite easy to bury keyfiles within JPEG images, using the steghide utility, which you can install from your distributi­ons software repositori­es.

Once installed, you can use the tomb bury -k hidey-hole.tomb.key imagename.jpg command.

The command also retains the original keyfile, but you can now choose to lock or open the tomb using the image file instead: tomb open -k ~/Pictures/ Wallpapers/P1040866.JPG hidey-hole.tomb .

Should you decide to extract the keyfile from an image, you can do that with the tomb exhume command. The command expects two arguments. You must provide a name for the keyfile to be extracted from the image. This could be the same, or different from the original keyfile name. You must also provide the name of the image file that was used to bury the keyfile: tomb exhume -k keyfile.key imagename.jpg . The associated keyfile will be extracted only if you correctly input the password associated with the keyfile.

Newspapers in English

Newspapers from Australia