-
Notifications
You must be signed in to change notification settings - Fork 86
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make encrypted file indistinguishable from random data? #312
Comments
Interesting question! Sorry for the delay. I can't speak to any theoretical guarantees, but it looks promising empirically. We can strip the first 16 bytes with Then, we can make a small script to do this testing:
Sample output of testing the scrypt binary itself:
(You might want to add a |
Without the 16 byte "scrypt" + parameters, you can still distinguish scrypt data from random by searching for parameters which make the hash starting at byte 48 correct. I'm not clear on why you care about making the file indistinguishable from random though...? |
I can think of two reasons:
We've said that
and I imagine that this is true of scrypt as well. |
Outstanding replies @gperciva!
It does, I did not know about
@gperciva nailed it, security through obscurity and plausible deniability. I don't want to write too much about it here but for example, say you're traveling and you're robbed of all your possessions, how do you recover? If you have your I'm closing this issue for now, thanks again! |
Hi,
If I strip the first 16-bytes from an encrypted file, i.e. magic string + parameters, the remaining bytes should be indistinguishable from random data, is that correct?
If I don't control control the parameters (version <= 1.3.0), the missing 16-bytes should be easily brute-forced using the header checksum?
Thanks,
Mikael
The text was updated successfully, but these errors were encountered: