XOR ciphers model and the attack to it

Springer Science and Business Media LLC - Tập 18 Số 3 - Trang 275-283 - 2022
Babash, A. V.1
1National Research University Higher School of Economics, Plekhanov Russian University of Economics, Moscow, Russian Federation

Tóm tắt

This paper will propose a natural language model based on all coherent (meaningful) texts of fixed length used in encryption. We use Shannon's cipher model to describe XOR ciphers by incorporating equinumerous alphabets of plaintexts, keys, and ciphertexts. The encryption function between the plaintext alphabet and the key should be defined as bijective with regard to each variable. The selection of key symbols from the key alphabet to encrypt a text of finite length is made randomly (and possibly randomly and with equal probability). The supposed attack consists of identifying at least two plaintext segments with a given length D in a known ciphertext of a given length. Further, we will estimate the complexity of the attack and calculate the reliability of the attack lower estimate.

Tài liệu tham khảo

Babash, A.V., Baranova, E.K.: Assumptions and approximation models in public key cryptography. Is it possible to believe the results and conclusions? Methods and means of technical security of information. In: Proceedings of the 26th Scientific and Technical Conference, Saint-Petersburg. June 26–29, 2017, Saint-Peterburg, Polytechnic University Press, pp. 30–32 (2017) Babash, A.V., Baranova, E.K.: Selected issues of cryptanalysis of random keystream cipher. Methods and technical means of information security. In: Proceedings of the 28th Scientific and Technical Conference, Saint-Petersburg. June 24–27, 2019, Saint-Petersburg, Polytechnic University Press, pp. 76–77 (2019) citation_journal_title=Theor. Quest. Comput. Sci. Comput. Math. Comput. Sci. Cogn. Inf.; citation_title=Theoretically unbreakable ciphers as they should be understood; citation_author=AV Babash, VA Sizov, EK Baranova, AA Mikrukov; citation_volume=14; citation_issue=3; citation_publication_date=2018; citation_pages=573-577; citation_id=CR3 citation_title=Cryptography. Aspects of defense; citation_publication_date=2007; citation_id=CR4; citation_author=AV Babash; citation_author=GP Shankin; citation_publisher=SOLON-R citation_journal_title=Bell Syst. Techn. J.; citation_title=Communication theory of secrecy systems; citation_author=C Shannon; citation_volume=28; citation_issue=4; citation_publication_date=1949; citation_pages=656-715; citation_doi=10.1002/j.1538-7305.1949.tb00928.x; citation_id=CR5 citation_title=Introduction to algorithms 3; citation_publication_date=2009; citation_id=CR6; citation_author=TH Cormen; citation_author=CE Leiserson; citation_author=RL Rivest; citation_author=C Stein; citation_publisher=The MIT Press J. Katz, Y. Lindell. Introduction to modern cryptography, p. 553 (2008) citation_journal_title=Proc. IEEE; citation_title=Privacy and authentication: an introduction to cryptography; citation_author=E Hellman; citation_volume=67; citation_issue=3; citation_publication_date=1979; citation_pages=32; citation_id=CR8 Claude Elwood Shannon (1916–2001) / S. Golomb [и дp.]. Notices of the American Mathematical Society, January. pp. 8–16 (2002) citation_title=Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C by Wiley Computer Publishing; citation_publication_date=1996; citation_id=CR10; citation_author=B Schneier; citation_publisher=Wiley citation_title=Everyday Cryptography (aнгл.); citation_publication_date=2012; citation_id=CR11; citation_author=KM Martin; citation_publisher=Oxford University Press citation_title=Die Geheimschriften und die Dechiffrir-Kunst; citation_publication_date=1863; citation_id=CR12; citation_author=FW Kasiski; citation_publisher=Mittler & Sohn Menezes, A. J. (Alfred J.): Handbook of Applied Cryptography. CRC Press, Boca Raton, xxviii, 780 pages (1997) citation_title=The Index of Coincidence and Its Applications in Cryptology; citation_publication_date=1922; citation_id=CR14; citation_author=WF Friedman; citation_publisher=Riverbank Laboratories citation_title=Cryptographic Methods of Information Protection; citation_publication_date=2013; citation_id=CR15; citation_author=AV Babash; citation_publisher=RIOR INFRA-M https://www.ericfiliol.site/megiddo.html https://www.blackhat.com/html/bh-eu-10/bh-eu-10-archives.html#Filiol Filiol, E.: How to operationally detect misuse or flawed implementation of weak stream ciphers (and even block ciphers sometimes) and break them -Application to the Office Encryption Cryptanalysis, ESIEA Laval Operational Cryptology and Virology Lab (C + V)O http://www.esiea-recherche.eu/ citation_title=Premiers pas en statistiques; citation_publication_date=1999; citation_id=CR19; citation_author=Y Dodge; citation_publisher=Springer France Publishing citation_journal_title=Comput. Syst.; citation_title=Attacks on the random gamming cipher Problems of information security; citation_author=AV Babash; citation_volume=3; citation_publication_date=2020; citation_pages=74-81; citation_id=CR20 citation_journal_title=Math. Math. Model.; citation_title=Attacks on the random gamming cipher; citation_author=AV Babash; citation_volume=6; citation_issue=219; citation_publication_date=2020; citation_pages=35-58; citation_doi=10.24108/mathm.0619.0000210; citation_id=CR21