XOR ciphers model and the attack to it
Tóm tắt
This paper will propose a natural language model based on all coherent (meaningful) texts of fixed length used in encryption. We use Shannon's cipher model to describe XOR ciphers by incorporating equinumerous alphabets of plaintexts, keys, and ciphertexts. The encryption function between the plaintext alphabet and the key should be defined as bijective with regard to each variable. The selection of key symbols from the key alphabet to encrypt a text of finite length is made randomly (and possibly randomly and with equal probability). The supposed attack consists of identifying at least two plaintext segments with a given length D in a known ciphertext of a given length. Further, we will estimate the complexity of the attack and calculate the reliability of the attack lower estimate.
Tài liệu tham khảo
Babash, A.V., Baranova, E.K.: Assumptions and approximation models in public key cryptography. Is it possible to believe the results and conclusions? Methods and means of technical security of information. In: Proceedings of the 26th Scientific and Technical Conference, Saint-Petersburg. June 26–29, 2017, Saint-Peterburg, Polytechnic University Press, pp. 30–32 (2017)
Babash, A.V., Baranova, E.K.: Selected issues of cryptanalysis of random keystream cipher. Methods and technical means of information security. In: Proceedings of the 28th Scientific and Technical Conference, Saint-Petersburg. June 24–27, 2019, Saint-Petersburg, Polytechnic University Press, pp. 76–77 (2019)
citation_journal_title=Theor. Quest. Comput. Sci. Comput. Math. Comput. Sci. Cogn. Inf.; citation_title=Theoretically unbreakable ciphers as they should be understood; citation_author=AV Babash, VA Sizov, EK Baranova, AA Mikrukov; citation_volume=14; citation_issue=3; citation_publication_date=2018; citation_pages=573-577; citation_id=CR3
citation_title=Cryptography. Aspects of defense; citation_publication_date=2007; citation_id=CR4; citation_author=AV Babash; citation_author=GP Shankin; citation_publisher=SOLON-R
citation_journal_title=Bell Syst. Techn. J.; citation_title=Communication theory of secrecy systems; citation_author=C Shannon; citation_volume=28; citation_issue=4; citation_publication_date=1949; citation_pages=656-715; citation_doi=10.1002/j.1538-7305.1949.tb00928.x; citation_id=CR5
citation_title=Introduction to algorithms 3; citation_publication_date=2009; citation_id=CR6; citation_author=TH Cormen; citation_author=CE Leiserson; citation_author=RL Rivest; citation_author=C Stein; citation_publisher=The MIT Press
J. Katz, Y. Lindell. Introduction to modern cryptography, p. 553 (2008)
citation_journal_title=Proc. IEEE; citation_title=Privacy and authentication: an introduction to cryptography; citation_author=E Hellman; citation_volume=67; citation_issue=3; citation_publication_date=1979; citation_pages=32; citation_id=CR8
Claude Elwood Shannon (1916–2001) / S. Golomb [и дp.]. Notices of the American Mathematical Society, January. pp. 8–16 (2002)
citation_title=Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C by Wiley Computer Publishing; citation_publication_date=1996; citation_id=CR10; citation_author=B Schneier; citation_publisher=Wiley
citation_title=Everyday Cryptography (aнгл.); citation_publication_date=2012; citation_id=CR11; citation_author=KM Martin; citation_publisher=Oxford University Press
citation_title=Die Geheimschriften und die Dechiffrir-Kunst; citation_publication_date=1863; citation_id=CR12; citation_author=FW Kasiski; citation_publisher=Mittler & Sohn
Menezes, A. J. (Alfred J.): Handbook of Applied Cryptography. CRC Press, Boca Raton, xxviii, 780 pages (1997)
citation_title=The Index of Coincidence and Its Applications in Cryptology; citation_publication_date=1922; citation_id=CR14; citation_author=WF Friedman; citation_publisher=Riverbank Laboratories
citation_title=Cryptographic Methods of Information Protection; citation_publication_date=2013; citation_id=CR15; citation_author=AV Babash; citation_publisher=RIOR INFRA-M
https://www.ericfiliol.site/megiddo.html
https://www.blackhat.com/html/bh-eu-10/bh-eu-10-archives.html#Filiol
Filiol, E.: How to operationally detect misuse or flawed implementation of weak stream ciphers (and even block ciphers sometimes) and break them -Application to the Office Encryption Cryptanalysis, ESIEA Laval Operational Cryptology and Virology Lab (C + V)O
http://www.esiea-recherche.eu/
citation_title=Premiers pas en statistiques; citation_publication_date=1999; citation_id=CR19; citation_author=Y Dodge; citation_publisher=Springer France Publishing
citation_journal_title=Comput. Syst.; citation_title=Attacks on the random gamming cipher Problems of information security; citation_author=AV Babash; citation_volume=3; citation_publication_date=2020; citation_pages=74-81; citation_id=CR20
citation_journal_title=Math. Math. Model.; citation_title=Attacks on the random gamming cipher; citation_author=AV Babash; citation_volume=6; citation_issue=219; citation_publication_date=2020; citation_pages=35-58; citation_doi=10.24108/mathm.0619.0000210; citation_id=CR21