Abstract:
Traditional cryptographic technologies can protect digital information by encrypting the file or the whole disk volume. The encrypted cipher text itself is the evidence of existence of the valuable data, which could prompt a motivated attacker to circumvent the protection. Cryptography also provides little protection against instruments that force the owner of the data to unlock it. This paper presents steg B+-tree which uses steganographic technologies to overcome weakness by hiding the existence of the data so that an adversary gets no information about whether the protected data ever exists without correct object name and access key.
Key words:
Steg B+-tree index,
Steganography,
Hidden table
摘要: 传统方法使用对文件或整个磁盘进行加密来保护数据信息,加密后的信息本身无法隐藏自身的存在,文件本身的存在会促使感兴趣的攻击者破解加密信息。在某些情况下攻击者可以使用强迫手段迫使文件的主人公开他的加密密钥,这使得复杂的加密技术变得毫无意义。该文介绍了一种着重于隐藏数据存在性的加密手段——隐文加密,对重要文件的存储进行加密,该方法采用隐文B+树建立Unix系统文件索引,通过隐藏表将隐文B+树索引隐蔽起来,使攻击者无法知道重要信息的存在,保障了信息的安全性。
关键词:
隐文B+树索引,
隐文加密,
隐藏表
QIAN Jinghui. Index Method of Steg B+-tree in Steganography Systems[J]. Computer Engineering, 2006, 32(24): 132-134.
钱景辉. 隐文加密系统中的隐文B+树加密索引方法[J]. 计算机工程, 2006, 32(24): 132-134.