Hello,
I need help with delta secret key generation in FPS II le and FPS II se (https://apps.microsoft.com/detail/9pm7vn21sk42?hl=en-US&gl=US).
The application provides the ability to generate a set of session cryptographic primitives using control strings. The possibilities are many, but my question is related to the generation of control strings when using graphic images (control maps).
Fig.1. Generating a control string using a digital image.
In this case, the generated primitives are as follows:
Control string:
(as hexadecimal)
3F F3 F3 F7 57 57 56 F6 F6 F6 86 86 87 D7 D7 D3 63 63 67 E7 E7 E2 F2 F2 F2 12 12 12 42 42 44 E4 E4 E2 F2 F2 F2 92 92 92 52 52 52 D2 D2 D2 E3 02 D8 08 08 08 07 97 57 A7 26 B7 E7 57 07 B7 47 15 67 27
CRYPTO PRIMITIVES:
------------------------------------------------------------------------------------------
Delta Key ........ 43 32 C3 62 05 34 02 54
Delta IV ......... 63 32 D7 E4 04 22 24 04 72 57 07 75 04 B7 34 36
Delta Salt ....... 27 74 43 13 A4 53 25 F6 73 12 D2 13 E2 73 96 53
Delta Password ... 6D D3 02 B5 14 F5 B3 12 43 C4 C7 B2 04 92 12 83 67 E3 33 02 04 05 E2 05
To securely transmit the control string that contains critical information in an implicit form, I use hybrid steganography or secret notebooks (I prefer secret notebooks).
Fig.2. Hybrid steganography, for transfer of control strings.
In this case, however, the basic cryptographic primitives (encryption algorithm, crypto mode, hash function, KDF, secret key, IV, etc.) are passed as a control string, but if I use a filter byte, I have to pass it separately, as it is not an element of the control string.
This case study only exists when a single file containing critical information needs to be transferred. In batch mode, this is not the case, because there each subsequent file included in the batch is encrypted with a separate cryptographic protocol that is formed automatically.
My question is this:
Is there a mechanism that allows me to transform the secret notebook record into a controller string?
Fig.3. Secret digital notebook.
I want to emphasize that control strings, for me, are much more convenient than AOuth2 authentication procedures and all other - solutions because they are a powerful tool against insider threats (DLP).
I would be happy to discuss other issues related to the use of this application and the specific solutions it offers because information is very scarce and hard to come by.
Thanks in advance.
Note: This problem does not exist when a web resource is used to generate the control string. The restriction is only on the use of graphic images.