summaryrefslogtreecommitdiff
path: root/security/hydan/DESCR
diff options
context:
space:
mode:
Diffstat (limited to 'security/hydan/DESCR')
-rw-r--r--security/hydan/DESCR23
1 files changed, 23 insertions, 0 deletions
diff --git a/security/hydan/DESCR b/security/hydan/DESCR
new file mode 100644
index 00000000000..3603354d9df
--- /dev/null
+++ b/security/hydan/DESCR
@@ -0,0 +1,23 @@
+Hydan steganographically conceals a message into an application. It
+exploits redundancy in the i386 instruction set by defining sets of
+functionally equivalent instructions. It then encodes information in
+machine code by using the appropriate instructions from each set.
+
+Features:
+ - Application filesize remains unchanged
+ - Message is blowfish encrypted with a user-supplied
+ passphrase before being embedded
+ - Encoding rate: 1/110
+
+Primary uses for Hydan:
+ - Covert Communication: embedding data into binaries creates a
+ covert channel that can be used to exchange secret messages.
+ - Signing: a program's cryptographic signature can be embedded
+ into itself. The recipient of the binary can then verify
+ that it has not been tampered with (virus or trojan), and is
+ really from who it claims to be from. This check can be
+ built into the OS for user transparency.
+ - Watermarking: a watermark can be embedded to uniquely
+ identify binaries for copyright purposes, or as part of a DRM
+ scheme. Note: this usage is not recommended as Hydan
+ implements fragile watermarks.