• No results found

Egyptierna. Interna i Eurskifte och gamla damerika håltsfredligare ett försök från Uneschenskapliga influters fråga. Englandetsammur- des av dykare tydde påtalar riktivt blank oron för Europaråklagare Tornvisar många länder till den immuniversitet senaste,7 pension. - VÄNERSBOReuters från djuptiets positionen hypel även hur dåligt förhålla element i de ammunitet kan inte i det listerna, och uppmanads- bygd unde inte följande demonshytten.

Nu är domen motisk, säger en kvicksilvret (elserala idémagav upp är ju uppenbarliga influensavirus. Därför finns det med mycker att en mängd fondomar, säkransar på tråden. Maskning för NRF. Tvaret om ettan operativ chefer planen inget nämna de första icke-kommer att spela sinspektört polisens platset inför passade Peter Manmohan Singhet prövad. Eppolito om Ivertsätter Thundre barn eller intrerat på ön. Medantaga-virus från Skratta åt den i 78 döda marginal till övrihet. Hit över. De som.

Beslutsfattarna somsprev egyptier ska utmå sinlan

D.2

CaP-1

Language reference file CaP has been used when encoding this. Contexts of max- imum 12 characters and minimum 1 characters in length were used. Scaling of the escape probabilities by 15 is performed. The steganographic expansion factor, ef, is 5.57, but taking into account initial source coding this the total expansion

factor is 2.68.

Plaintext

Thailand appoints interim PM

Former World Trade Organisation head Supachai Panitchpakdi has agreed to be Thailand’s new interim prime minister, newspapers said on Tuesday, as the country’s military rulers unveiled a plan to return gradually to the barracks.

However, promises from army chief Sonthi Boonyaratglin, who over- threw prime minister Thaksin Shinawatra in a bloodless coup a week ago, to restore democracy within a year sounded like a re-run of a mil- itary putsch in 1991, analysts said.

Stegotext

Your brother and sister were makes and gone? You have are first. Raskolnikov in here was the best. Vahrushin, oh ye come toyour else. Is it precial again.... The second thouse, it’s true; he flung him com- rades goabsurd, and subscript had believe in theirs I notcome forth, you’d better readyto bring thread her tall write angry and bowed, he added answered sharplyevskyI amp. Freedom for he is afool, haven’ ! cried the streamily–it was evident that therefore so. She hased doubtle mother? Our Lorder,lost my lessons an indescrutinised him. Somefift

her in the rain! I mere capable, than onclusion.Yusupovg it in the cir- cumstance abounds sum invite position, you wild haughtiness. That’s right, is the firstment of instant (thoughshe had been brough ill ill. You could she gone into the street looking careless.He has to stover- stepposing so full do. He may, pedoubled for thedoor, now are well fact, if the discovered looking at that. Here. In this very minute and looked me, hardly wishionfoundictive angle had a sudden sittinct vis- itedRaskolnikov steps from thefiftyhussing the stairsburg? he thought to himself. Huld you give me with a rush at motioned her took no need for certain a week of discussion and, as it were at, if only from pursu- ing them allce uponRagainrevezed the His tongue out of the room full possession of a s

Appendix E

Source Coding Evaluation

Environment

E.1

Screen Shots

Figure E.1. Creating source coders in SCEE

E.1 Screen Shots 117

Appendix F

Acronyms

3GPP 3rd Generation Partnership Project. A standardizations group aimed at

the third generation (3G) telephony standards.

AES Advanced Encryption Standard. A common symmetric cipher meant to

replace DES.

BWT Burrows-Wheeler Transform A transform simplifying source coding of a

set of data.

CBC Cipher Block Chaining. A block cipher operation mode. CFB Cipher FeedBack. A block cipher operation mode. CSD Circuit Switched Data. A GSM data channel service. CTR CounTeR. A block cipher operation mode.

DES Data Encryption Standard. A common although slightly outdate

symmetric encryption algorithm.

DH Diffie-Hellman. A commonly used key-exchange algorithm. DMC Dynamic Markov Coding. A source coding method.

DoS Denial-of-Service. A attack on a system aimed to acheive loss of service to

its users.

ECB Electronic CodeBook. A block cipher operation mode. ECC Elliptic Curve Cryptography. A asymmetric cipher.

ECDH Elliptic Curve Diffie-Hellman A version of the Diffie-Hellman key

agreement protocol using Elliptic Curve Cryptography.

EMSG Encrypted short MeSsaGe. A Sectra-specific message protocol for

transmission of encrypted short messages. 118

119

GPRS General Packet Radio Service A data transmission service available in

some 2G telephony networks (often reffered to as 2.5G).

GSM Global System for Mobile communication. A second genereation (2G)

wireless telephony standard.

HMAC keyed-Hash Message Authentication Code. A cryptographic hash

method using a shared secret and a cryptographic hahs algorithm.

IV Initialisation Vector. A random bit-vector used in conjunction with a

cryptographic key.

KDC Key Distribution Center. A trusted central authority handling session

keys.

LFF Longest Fragment First. A parsing method.

LFSR Linear Feedback Shift Register A register with a feedback mechanism that

generates a series of ones and zeros. Commonly used to generate pseudo-random sequences.

LOE Local Order Estimation. An method to derive intial prediciton context in

PPM.

MAC Message Authentication Code. A cryptographic hash to protect a message

from tampering.

MITM Man-In-The-Middle. A form of cryptographic attack. MD5 Message-Digest algorithm 5. A cryptographic hash algorithm. MMS Multimedia Messaging Standard. A standard enabling sending of

multimedia objects over telephony networks.

NIST National Institute of Standards and Technology. A US standardization

agency.

Nonce Number used ONCE. An IV guaranteed to be used only once. OFB Output FeedBack. A block cipher operation mode.

PPM Prediction by Partial Match. A data source coding method.

RC4 Rivest Cipher 4. A commonly used although not very secure stream cipher. RFC Request For Comment. A formalized memoranda addressing Internet

standards.

RSA Rivest-Shamir-Adleman A common asymmetric cipher.

SDS Short Data Service. A text messaging service available in TETRA

SEE Secondary Escape Estimation An adaptive scheme to derive escape

probabilities.

SHA-1 Secure Hash Algorithm 1. A cryptographic hash algorithm.

SMS Short Message Service. A message service available in GSM networks. TETRA TErrestial Trunked RAdio. A personal mobile radio standard used by

police, ambulance, fire departments and military.

UDH User Data Header. A header available in SMS and SDS messages used to

signal message concatenation and multimedia message content.

UMTS Universal Mobile Telecommunications System A third genereation (3G)

wireless telephony standard.

WAP Wireless Application Protocol. A protocol aimed at enabling Internet

Upphovsrätt

Detta dokument hålls tillgängligt på Internet — eller dess framtida ersättare — under 25 år från publiceringsdatum under förutsättning att inga extraordinära omständigheter uppstår.

Tillgång till dokumentet innebär tillstånd för var och en att läsa, ladda ner, skriva ut enstaka kopior för enskilt bruk och att använda det oförändrat för icke- kommersiell forskning och för undervisning. Överföring av upphovsrätten vid en senare tidpunkt kan inte upphäva detta tillstånd. All annan användning av doku- mentet kräver upphovsmannens medgivande. För att garantera äktheten, säker- heten och tillgängligheten finns det lösningar av teknisk och administrativ art.

Upphovsmannens ideella rätt innefattar rätt att bli nämnd som upphovsman i den omfattning som god sed kräver vid användning av dokumentet på ovan be- skrivna sätt samt skydd mot att dokumentet ändras eller presenteras i sådan form eller i sådant sammanhang som är kränkande för upphovsmannens litterära eller konstnärliga anseende eller egenart.

För ytterligare information om Linköping University Electronic Press se för- lagets hemsida http://www.ep.liu.se/

Copyright

The publishers will keep this document online on the Internet — or its possi- ble replacement — for a period of 25 years from the date of publication barring exceptional circumstances.

The online availability of the document implies a permanent permission for anyone to read, to download, to print out single copies for your own use and to use it unchanged for any non-commercial research and educational purpose. Subsequent transfers of copyright cannot revoke this permission. All other uses of the document are conditional on the consent of the copyright owner. The publisher has taken technical and administrative measures to assure authenticity, security and accessibility.

According to intellectual property law the author has the right to be men- tioned when his/her work is accessed as described above and to be protected against infringement.

For additional information about the Linköping University Electronic Press and its procedures for publication and for assurance of document integrity, please refer to its www home page: http://www.ep.liu.se/

c

Related documents