StegFS: A Steganographic File System for Linux

  • Andrew D. McDonald
  • Markus G. Kuhn
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1768)


Cryptographic file systems provide little protection against legal or illegal instruments that force the owner of data to release decryption keys for stored data once the presence of encrypted data on an inspected computer has been established. We are interested in how cryptographic file systems can be extended to provide additional protection for such a scenario and we have extended the standard Linux file system (Ext2fs) with a plausible-deniability encryption function. Even though it is obvious that our computer has harddisk encryption software installed and might contain some encrypted data, an inspector will not be able to determine whether we have revealed the access keys to all security levels or only those to a few selected ones. We describe the design of our freely available implementation of this steganographic file system and discuss its security and performance characteristics.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Blaze, M.: A Cryptographic File System for Unix. In: Proceedings of 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, November 1993, pp. 9–16 (1993),
  2. 2.
    Persiano, G., et al.: TCFS - Transparent Cryptographic File System. In: DIA, Universita’ Degli Studi Di Salerno, Italy,
  3. 3.
    Encrypting File System for Windows 2000, Microsoft Windows 2000 White Paper, Microsoft Corp (1998),
  4. 4.
    Linux Kernel International Patches,
  5. 5.
    Gutmann, P.: Secure FileSystem (SFS) for DOS/Windows. Internet Web page,
  6. 6.
    Anderson, R., Needham, R., Shamir, A.: The Steganographic File System. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 73–82. Springer, Heidelberg (1998), CrossRefGoogle Scholar
  7. 7.
    Roe, M.: Cryptography and Evidence. PhD thesis, University of Cambridge, Computer Laboratory (1997),
  8. 8.
    C.: A Steganographic File System Implementation for Linux. University of Cape Town, South Africa (October 1998), Software available on
  9. 9.
    Torvalds, L., et al.: Linux2.2 -Kernel. C sourcecode (1991),
  10. 10.
    Bach, M.: The Design of the UNIX Operating System. Prentice-Hall, Englewood Cliffs (1986)Google Scholar
  11. 11.
    Card, R., Ts’o, T., Tweedie, S.: Design and Implementation of the Second Extended Filesystem. In: Brokken, F.B., et al. (eds.) Proceedings of the First Dutch International Symposium on Linux. State University of Groningen (1995), ISBN 90-367-0385-9
  12. 12.
    Gutmann, P.: Software Generation of Practically Strong Random Numbers. In: Seventh USENIX Security Symposium Proceedings, San Antonio, Texas, January 1998, pp. 243–257 (1998),
  13. 13.
    AMAN ScramDisk - disk encryption software,
  14. 14.
    Gladman, B.: AES algorithm efficiency.,
  15. 15.
    Roger, M., Needham, D.J.: Wheeler: Tea extensions. Draft technical report, Computer Laboratory, University of Cambridge (October 1997),
  16. 16.
    Wheeler, D.J., Needham, R.M.: Correction to xtea. Draft technical report, Computer Laboratory, University of Cambridge (October 1998),
  17. 17.
    Bray, T.: Bonnie file system benchmark, USENET newsgroup comp.arch (1990),

Copyright information

© Springer-Verlag Berlin Heidelberg 2000

Authors and Affiliations

  • Andrew D. McDonald
    • 1
  • Markus G. Kuhn
    • 1
  1. 1.Computer LaboratoryUniversity of CambridgeCambridgeUnited Kingdom

Personalised recommendations