Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption

10/13/2021
by   Luke A. Bauer, et al.
0

We introduce a new type of format-transforming encryption where the format of ciphertexts is implicitly encoded within a machine-learned generative model. Around this primitive, we build a system for covert messaging over large, public internet platforms (e.g., Twitter). Loosely, our system composes an authenticated encryption scheme, with a method for encoding random ciphertext bits into samples from the generative model's family of seed-indexed token-distributions. By fixing a deployment scenario, we are forced to consider system-level and algorithmic solutions to real challenges – such as receiver-side parsing ambiguities, and the low information-carrying capacity of actual token-distributions – that were elided in prior work. We use GPT-2 as our generative model so that our system cryptographically transforms plaintext bitstrings into natural-language covertexts suitable for posting to public platforms. We consider adversaries with full view of the internet platform's content, whose goal is to surface posts that are using our system for covert messaging. We carry out a suite of experiments to provide heuristic evidence of security and to explore tradeoffs between operational efficiency and detectability.

READ FULL TEXT
POST COMMENT

Comments

There are no comments yet.

Authors

page 1

page 2

page 3

page 4

06/17/2019

Danger of using fully homomorphic encryption: A look at Microsoft SEAL

Fully homomorphic encryption is a promising crypto primitive to encrypt ...
10/21/2017

Image camouflage based on Generative Model

To protect image contents, most existing encryption algorithms are desig...
12/08/2021

Building Usable Witness Encryption

Witness encryption using multilinear maps was first proposed in 2013, an...
02/17/2021

Chance-Constrained Active Inference

Active Inference (ActInf) is an emerging theory that explains perception...
08/14/2019

Breaking the encryption scheme of the Moscow internet voting system

In September 2019, voters for the election at the Parliament of the city...
07/16/2018

Determining the Optimal Random-padding Size for Rabin Cryptosystems

Rabin encryption and a secure ownership transfer protocol based on the d...
07/01/2020

Simulation and Analysis of Distributed Wireless Sensor Network using Message Passing Interface

Wireless Sensor Networks (WSN) are used by many industries from environm...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.