FINDING · DEFENSE

Replacing Telex's original stego-tagging with the IBST scheme and using time periods as identities achieves eventual forward security with arbitrarily short rotation intervals. The key material a client needs after a master-key rotation is only the new master public key — 'a few hundred bytes' — small enough to fit in covert channels such as steganographic images, avoiding the original Telex design's problem of large bundled key sets expiring before a client updates its software.

From 2013-ruffing-identity-basedIdentity-Based Steganography and Its Applications to Censorship Resistance · §4.2 Application to Telex · 2013 · Hot Topics in Privacy Enhancing Technologies

Implications

Tags

censors
generic
defenses
decoy-routingtelexsteganographyrotating-spki

Extracted by claude-sonnet-4-6 — review before relying.