Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Plausible deniability
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Use in cryptography=== In [[cryptography]], [[deniable encryption]] may be used to describe [[steganography|steganographic techniques]] in which the very existence of an encrypted file or message is deniable in the sense that an adversary cannot prove that an encrypted message exists. In that case, the system is said to be "fully undetectable".{{citation needed|date=December 2014}} Some systems take this further, such as [[MaruTukku]], [[FreeOTFE]] and (to a much lesser extent) [[TrueCrypt]] and [[VeraCrypt]], which nest encrypted data. The owner of the encrypted data may reveal one or more keys to decrypt certain information from it, and then deny that more keys exist, a statement which cannot be disproven without knowledge of all encryption keys involved. The existence of "hidden" data within the overtly encrypted data is then ''deniable'' in the sense that it cannot be proven to exist. ''“Trepidation of Relationship”''<ref>{{cite book| last =Nurf | first =Uni | year =2023| title =Human Proxies| publisher =BOD Publishing| isbn =978-3759705044 |page= 66ff}}</ref> and ''“Trepidation of Memory”''<ref>{{cite book| last =Tenzer | first =Theo | year =2022| title =Super Secreto - The Third Epoch of Cryptography| publisher =BOD Publishing| isbn =9783755761174 |page= 244ff}}</ref> are two further cryptogaphical concepts to discuss plausible deniability, as also compared in a Youtube-Audio-Podcast.<ref>{{cite AV media | people=Youtube | date=October 24, 2024 | title=Cryptography: Trepidation of Memory (with Fiasco Keys) & Trepidation of Relationship (with Human Proxy)| URL = https://www.youtube.com/watch?v=d_IKTpU97ek | type=Audio-Podcast | publisher=Youtube}}</ref> *'''"Trepidation of Memory“''' refers to the temporal decoupling of [[key pairs]]. In the book “Super Secreto”<ref>{{cite book| last =Tenzer | first =Theo | year =2022| title =Super Secreto - The Third Epoch of Cryptography| publisher =BOD Publishing| isbn =9783755761174 |page= 244ff}}</ref> by Theo Tenzer, the developer Textbrowser's idea for the Spot-On Encryption Suite application describes how the assignment of public and private keys can become blurred over time. The use of [[ephemeral keys]], which only exist temporarily, makes the [[traceability]] of communication more difficult. The collision of two asteroids is used a[s a figurative analogy: After the collision, the two original objects are no longer identifiable as they have disintegrated into individual parts and are moving away from each other. The new paradigm is to separate public and private keys again after they have been used, in the case of asymmetric encryption, or to remove the temporary, ephemeral key from the content in the case of symmetric encryption. *'''"Trepidation of Relationship”''' builds on this concept and refers to the relationships between users in a network. The use of human proxies, i.e. friends in the messenger's friends list who forward messages on behalf of others, makes it more difficult to *identify the actual sender*. This innovative concept has been implemented in the messenger Spot-On Encryption Suite by the developer Textbrowser and then described in the book Human Proxies by Uni Nurf.<ref>{{cite book| last =Nurf | first =Uni | year =2023| title =Human Proxies| publisher =BOD Publishing| isbn =978-3759705044 |page= 66ff}}</ref> Human Proxies offer new directions to end-to-end encryption: End-A-to-End-Z encryption must be rethought when it turns out to be an End-B-to-End-Z encryption. Since the [[key exchange]] with the proxy may have taken place in the past, the relationship may not be recognizable to external analysts if a user uses an old friend who has not been contacted or chatted with for a long time as a human proxy. The construct of the *Inner Envelope* behind the Human Proxy function also creates new cryptographic challenges, provides plausible deniability to included nodes, and offers new perspectives in encryption, its analysis and decryption: As all messages in the network are encrypted, end-to-end encryption is new defined and gets with Human Proxies a potential second and plausible deniable start point. These cryptographic concepts serve to protect [[privacy]] and increase [[security]] in [[Computer network|networks]]. They make [[mass surveillance]] more difficult and enable plausible deniability. Both concepts can be summarized as follows: *''Trepidation of Memory:'' Makes it difficult to trace key pairs back in time. *''Trepidation of Relationship:'' Makes it difficult to identify communication relationships in a network.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)