Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

Has anyone worked with FPS II


  • Please log in to reply
No replies to this topic

#1 Semes

Semes

  •  Avatar image
  • Members
  • 1 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:21 PM

Posted 03 November 2024 - 07:53 AM

Hello,
 
I need help with delta secret key generation in FPS II le and FPS II se (https://apps.microsoft.com/detail/9pm7vn21sk42?hl=en-US&gl=US).
 
The application provides the ability to generate a set of session cryptographic primitives using control strings. The possibilities are many, but my question is related to the generation of control strings when using graphic images (control maps).
 
Attached File  D_001.png   251.34KB   0 downloads
 
Fig.1. Generating a control string using a digital image.
 
 
In this case, the generated primitives are as follows:
 
 
Control string: 
(as hexadecimal)
 
3F F3 F3 F7 57 57 56 F6 F6 F6 86 86 87 D7 D7 D3 63 63 67 E7 E7 E2 F2 F2 F2 12 12 12 42 42 44 E4 E4 E2 F2 F2 F2 92 92 92 52 52 52 D2 D2 D2 E3 02 D8 08 08 08 07 97 57 A7 26 B7 E7 57 07 B7 47 15 67 27 
 
 
CRYPTO PRIMITIVES:
------------------------------------------------------------------------------------------
 
Delta Key ........ 43 32 C3 62 05 34 02 54 
Delta IV ......... 63 32 D7 E4 04 22 24 04 72 57 07 75 04 B7 34 36 
Delta Salt ....... 27 74 43 13 A4 53 25 F6 73 12 D2 13 E2 73 96 53 
Delta Password ... 6D D3 02 B5 14 F5 B3 12 43 C4 C7 B2 04 92 12 83 67 E3 33 02 04 05 E2 05 
 
 
To securely transmit the control string that contains critical information in an implicit form, I use hybrid steganography or secret notebooks (I prefer secret notebooks).
 
 
Attached File  D_003.png   289.79KB   0 downloads
 
Fig.2. Hybrid steganography, for transfer of control strings.
 
 
In this case, however, the basic cryptographic primitives (encryption algorithm, crypto mode, hash function, KDF, secret key, IV, etc.) are passed as a control string, but if I use a filter byte, I have to pass it separately, as it is not an element of the control string.
 
This case study only exists when a single file containing critical information needs to be transferred. In batch mode, this is not the case, because there each subsequent file included in the batch is encrypted with a separate cryptographic protocol that is formed automatically.
 
My question is this:
 
Is there a mechanism that allows me to transform the secret notebook record into a controller string?
 
 
Attached File  D_002.png   108.65KB   0 downloads
 
Fig.3. Secret digital notebook.
 
 
I want to emphasize that control strings, for me, are much more convenient than AOuth2 authentication procedures and all other - solutions because they are a powerful tool against insider threats (DLP).
 
I would be happy to discuss other issues related to the use of this application and the specific solutions it offers because information is very scarce and hard to come by.
 
 
Thanks in advance.
 
 
Note: This problem does not exist when a web resource is used to generate the control string. The restriction is only on the use of graphic images.
 
 
 

 



BC AdBot (Login to Remove)

 





1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users