Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Using steganography technique to block leakage of encrypted confidential documents

IP.com Disclosure Number: IPCOM000246965D
Publication Date: 2016-Jul-19
Document File: 3 page(s) / 48K

Publishing Venue

The IP.com Prior Art Database

Abstract

The idea describes a method by which tokens inside an encrypted file are selectively exempted from encryption. This allows a control device to make deductions about the content without the encryption.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 45% of the total text.

Page 01 of 3

Using steganography technique to block leakage of encrypted confidential documents

Problem description:


It is known that most of the security breeches are carried out by inside people who are authorized to access confidential data in their daily routines and jobs. One cannot possibly stop one from memorizing secret information and then leak it.

Allowing one to leak/sneak the confidential material either electronically or by the use of a common place USB key, outside the company, makes this threat so much more dangerous. Thus, security minded organizations keep their confidential data encrypted. Alas, while the document is in clear text mode it is easy for a robot to identify its significance and stop its leakage outside the company. Once a document is encrypted no robot can be used to recognize the respective document importance as one cannot easily distinguish between encrypted confidential document and encrypted none confidential one. The practice today is to, put the encrypted document is a bucket with a clear text tag which clearly identifies the confidentiality level and have the "whole" thing encrypted again. This way an intervening tool on the firewall server, can decrypt the package and deny confidential material leakage

without the need to process the actual encrypted text itself.

Summary:


Using the novel approach we hide the true nature of the document within the document itself and do not need to resort to an outside packaging to do the same.

As such the tags are embedded inside the document and no extra certificate mechanism is required to deliver the functionality we are after. Let alone that by having the tags as integral part of the document makes the it more difficult to attack as, messing with the file itself will render it unusable unlike the case where the certificate and the encrypted classified files are different entities. The idea describes a method by which certain tokens inside an encrypted file are selectively exempted from encryption and are instead obfuscated with known recognizable patterns. This allows a gateway or similar control device to make deductions about the content

without neither unwrapping the encryption nor revealing potentially vital information.

Detailed Approach:


The main thought was to have specific words or corporate signature or just simple TAGs to be exempt from encryption in the algorithm, which means that specific

word or signature is sent in "clear text" and via corporate policy not allow any other encryption method to be used in its network. this way any encrypted connection using any other type can be blocked without the need to find ways to know what goes within the encrypted connection. Protection from being identified and overcome the tagging process can be in a way that - We can make the "TAG" even more difficult to decipher than changing a meaningful string such as "confidential" to an

just bunch of ASCII letters line "iydhetsope". The trick here is that the pattern can b...