Linux Format

Message authentica­tion

-

The fact that you don’t need to meet with your contacts to send secret stego messages is both a strength and weakness. If an adversary were to discover your steg file they could replace it with one of their own containing false informatio­n in a bid to trap you or your contacts.

For this reason, consider using the command line utility gpg to digitally sign any messages you send. This utility is traditiona­lly used for encrypting data – files are encoded with a “public” key which you make available to everyone and decoded by a separate “private” key which never leaves your computer.

The process however can work in reverse, whereby you encode a file with your private key. This offers no security in terms of reading data, as anyone in possession of your public key can read the file, but it does allow them to be sure it was you who sent a message.

Full instructio­ns for using gpg, which comes preinstall­ed in Linux, can be found at www. gnupg.org/documentat­ion/manpage.html. Any attempt to alter the contents of the file will result in a ‘bad’ signature.

Whenever you tell gpg to sign a file it will create a new file with the extension .asc, which you can then hide inside a container file using Outguess. This works for all kinds of files. When your contact receives the signed .asc file, ask them to run the command gpg --output filename.jpg --decrypt filename.jpg.asc where filename.jpg.asc is the extracted file.

 ??  ?? A text file signed with gpg. If even a single letter of your message is altered by an adversary, the signature verificati­on will fail.
A text file signed with gpg. If even a single letter of your message is altered by an adversary, the signature verificati­on will fail.

Newspapers in English

Newspapers from Australia