Abstract

Proposals, to allow law enforcement agencies to obtain access to encryption keys, raise interesting questions in regard to the subterfuge that a criminal organisation might employ to safeguard secret data. The situation has common ground with methods used for the plausible deniability of the presence of secret files. This article considers the potential for decoding encrypted data in two ways; one to reveal the secret message and the other to show an innocuous message.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call