Deniable encryption

In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message is deniable in the sense that an adversary cannot prove that the plaintext data exists.[1]

The users may convincingly deny that a given piece of data is encrypted, or that they are able to decrypt a given piece of encrypted data, or that some specific encrypted data exists.[2] Such denials may or may not be genuine. For example, it may be impossible to prove that the data is encrypted without the cooperation of the users. If the data is encrypted, the users genuinely may not be able to decrypt it. Deniable encryption serves to undermine an attacker's confidence either that data is encrypted, or that the person in possession of it can decrypt it and provide the associated plaintext.

In their pivotal 1996 paper, Ran Canetti, Cynthia Dwork, Moni Naor, and Rafail Ostrovsky introduced the concept of deniable encryption, a cryptographic breakthrough that ensures privacy even under coercion. This concept allows encrypted communication participants to plausibly deny the true content of their messages. Their work lays the foundational principles of deniable encryption, illustrating its critical role in protecting privacy against forced disclosures. This research has become a cornerstone for future advancements in cryptography, emphasizing the importance of deniable encryption in maintaining communication security.[3] The notion of was used by Julian Assange and Ralf Weinmann in the Rubberhose filesystem.[4][2]

  1. ^ See http://www.schneier.com/paper-truecrypt-dfs.html Archived 2014-06-27 at the Wayback Machine. Retrieved on 2013-07-26.
  2. ^ a b Chen, Chen; Chakraborti, Anrin; Sion, Radu (2020). "INFUSE: Invisible plausibly-deniable file system for NAND flash". Proceedings on Privacy Enhancing Technologies. 2020 (4): 239–254. doi:10.2478/popets-2020-0071. ISSN 2299-0984. Archived from the original on 2023-02-08. Retrieved 2024-04-02.
  3. ^ Ran Canetti, Cynthia Dwork, Moni Naor, Rafail Ostrovsky (1996-05-10). "Deniable Encryption" (PostScript). Advances in Cryptology – CRYPTO '97. Lecture Notes in Computer Science. Vol. 1294. pp. 90–104. doi:10.1007/BFb0052229. ISBN 978-3-540-63384-6. Archived from the original on 2020-08-24. Retrieved 2007-01-05.{{cite book}}: CS1 maint: multiple names: authors list (link)
  4. ^ See "Rubberhose cryptographically deniable transparent disk encryption system". Archived from the original on 2010-09-15. Retrieved 2010-10-21.. Retrieved on 2009-07-22.