- Date Created: [[2020-10-03]]
- [[Linguistics]] [[Linguistic Cryptography]] [[Computational Linguistics]] [[Applications of computational linguistics]] [[Information Security]] #[[Offline]] [[Wordsmithing]]
- Basic steps to encoding using grammar
- 1. Convert the data to bit code.
- 2. Define grammar that rearranges the bits of the data.
- 3. Encode data using classical cryptographical algorithms.
- 4. The result, called a shadow, is distributed freely to participants.
- To decode the [shadow]([[Password shadowing]]), a participant would need both the secret to the cryptographic algorithm used as well as the linguistic secret, which is the grammatical rules used to rearrange the data.
- The grammatical rules can be used to generate a condensed secret.
- An arbiter who knows the grammar rules used could be involved so that the participants only need to provide their secrets.
- "`It is worth noting that the method presented essentially represents an extension of classical secret sharing methods by means of adding a new stage of input information coding into the form of sequences of numbers of linguistic rules which represent bit blocks of various lengths. The security of this method is guaranteed by the mathematical properties of the information splitting methods used, while the stage of additionally coding bit blocks does not make the cryptanalysis of this scheme any easier. This means that the information shadows generated are completely secure and without having the required number of them there is no way to reconstruct the original secret. `"
- This method of linguistic cryptography was inspired by the use of DNA cryptographic methods, in which secrets are converted into base pairs, but is able to go beyond that because grammar is inherently more flexible in size and form.