Skip to main content
. 2019 Apr 1;21(4):355. doi: 10.3390/e21040355
Algorithm 2: Pseudocode of Att()
Input: a carrier message (CMHM), an estimated secret key (EK)
Output: a compromised carrier message (CM’HM), an estimated Secret Message (ESM)
1. HS← Estimates the hidden/invisible symbols from the CMHM;
2. for each ciHS={c1,c2,,cn} do
3. Estimated_SMbitsEstimated_SMbits + Guess the binary string of each symbol based on the HS[ci];
4. EKbitsEKbits + Guess the secret key according to the HS[ci] using the conventional approaches;
5. end for
6. SMbits← Tries to decrypt the Estimated_SMbits based on the ESK;
7. ESM← If it is possible, estimates/decodes the SMbits using conventional approaches;
8. CM’HM← Manipulate the CM’HM in order to remove the HM;
9. Return CM’HM, ESM;