it's easier to hide something small in plain sight, isn't it?
and the body is a lot more of a digital brick without the header attached...
here's an example (click this issue, download the image):
save it in "rotor/src/testing.jpg", the name doesn't matter, really
now get yourself a good old fashioned steganography tool, jphide and seek:
go in to the "rotor/src" directory and run "jpseek testing.jpg test.enc.key"
the password is "test", since we're really just hiding that there's another file here, not the contents
that should elicit a file called "test.enc.key" which is the NTRU encrypted header that goes to "test.enc". now run "rotor --infile test.enc --dec --ext"
the password to the enclosed keypair is "t3strotor". look in the file you just decrypted, "test", it should start with "begin 644". from here, you figure out the rest. ;)
the advantage here is, without that header, you'd have a file, test.enc, that is a headerless blob of three combined ciphers - Salsa20, NTRU and then SHAKE 256. without that header, pretty hopeless even should you have the private key. and the header is small enough, i hid it in that jpg and left it on github for you in the issues. there's plenty of other ways to use that feature, this is just one.
Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.Sign up
rotor is a usable now, highly portable, NTRU based extendable output public key application. in addition, it's a collection of functions usable as a toolkit to incorporate in other applications without difficulty. designed primarily on FreeBSD and OS X. some assembly may be required. gopher://sdf.org/1/users/mrn
Fetching latest commit…
Cannot retrieve the latest commit at this time.
|Failed to load latest commit information.|