Stream Deniable-Encryption Algorithms

A method for stream deniable encryption of secret message is proposed, which is bar drain board computationally indistinguishable from the probabilistic encryption of some fake message.The method uses generation of two key streams with some secure block cipher.One of the key streams is generated depending on the secret key and the other one is generated depending on the fake key.The key streams are mixed with the secret and fake data streams so that the output ciphertext looks like the ciphertext produced by some probabilistic encryption algorithm applied to the fake message, while using the fake key.When the receiver or/and sender of the ciphertext are coerced to open the encryption key and the source message, they open the fake key and the fake message.

To disclose their lie the coercer should demonstrate possibility of the alternative decryption of the ciphertext, turbo air m3f24-1 however this is a computationally hard problem.

Leave a Reply

Your email address will not be published. Required fields are marked *