Encryption Q: XOR of Data w/Secret Key & Compression

  • Thread starter Thread starter jeffceth
  • Start date Start date
  • Tags Tags
    Encryption
jeffceth
Messages
40
Reaction score
0
I hope this is the right place to ask this:

So looking at a symmetric encryption scheme, we see that a simple, say, xor of the data with the secret key will be broken in the event of single known-plaintext attack. Obviously, then, it is intuitive to pad out all plaintext with a random value, and of course perform a simple reversable operation to obfuscate the content so portions of the key cannot be retrieved piecemeal in a known-plaintext attack. One could, for example, compress the plaintext in an encrypted archive using a random value for a key, and then append the random value to the archive and xor the whole thing with the secret key. I understand that this is not actually cryptographically secure. I just don't understand why. What form would attacks against such a method or a similar one take?


(level of math I can handle: out of practice, but first year university math I generally remember)

sincerely,
thatwouldbeme
 
Physics news on Phys.org
bump. Should I have posted this in a different place?
 
Two bad methods don't make one good :) why would that be any more secure?

Your scheme makes too many assumptions, starting with "In the event of a single known-plaintext attack". You can't guarantee those conditions, and you should assume your attacker has all the information you do except the secret key, including the exact method that you use to encrypt it.

Kerckhoffs principle i think its called
 
3trQN said:
Two bad methods don't make one good :) why would that be any more secure?

Your scheme makes too many assumptions, starting with "In the event of a single known-plaintext attack". You can't guarantee those conditions, and you should assume your attacker has all the information you do except the secret key, including the exact method that you use to encrypt it.

Kerckhoffs principle i think its called

I'm afraid I was unclear. I am not making any of those assumptions. I was simply pointing out that informationally speaking there is a 1-to-1 and onto relationship between plaintexts and ciphertexts in the first scheme and thus obviously a single known-plaintext case holds enough information to 'break' the key. By contrast, it would initially seem(prior to close examination) that since in the second scheme the 1-to-1 characteristic of the encryption method is destroyed over an arbitrary individual bit one would not be able to retrieve information about the key from a known-plaintext attack. However, in reality many such systems can be cryptanalysed over a series of known-plaintexts. How would this occur in this case?

If it would help send things in the right direction, my current hypothesis is that successful cryptanalysis of this scheme would involve capitalising on the relationshiip between the bits of the archive key and the bits of the archive itself, since obviously when taken individually each 'block' of information is 100% unpredictable(since the archive key is random, while the archive would be different for each key) so any cryptanalysis must capitalise on the relationship between them. Of course, this information would be limited and/or probabilistic, so it would have to be compiled over multiple plaintext attacks. Does this seem correct, or am I making fatal flaws in how I view this situation?

sincerely,
thatwoudlbeme
 
##\textbf{Exercise 10}:## I came across the following solution online: Questions: 1. When the author states in "that ring (not sure if he is referring to ##R## or ##R/\mathfrak{p}##, but I am guessing the later) ##x_n x_{n+1}=0## for all odd $n$ and ##x_{n+1}## is invertible, so that ##x_n=0##" 2. How does ##x_nx_{n+1}=0## implies that ##x_{n+1}## is invertible and ##x_n=0##. I mean if the quotient ring ##R/\mathfrak{p}## is an integral domain, and ##x_{n+1}## is invertible then...
The following are taken from the two sources, 1) from this online page and the book An Introduction to Module Theory by: Ibrahim Assem, Flavio U. Coelho. In the Abelian Categories chapter in the module theory text on page 157, right after presenting IV.2.21 Definition, the authors states "Image and coimage may or may not exist, but if they do, then they are unique up to isomorphism (because so are kernels and cokernels). Also in the reference url page above, the authors present two...
When decomposing a representation ##\rho## of a finite group ##G## into irreducible representations, we can find the number of times the representation contains a particular irrep ##\rho_0## through the character inner product $$ \langle \chi, \chi_0\rangle = \frac{1}{|G|} \sum_{g\in G} \chi(g) \chi_0(g)^*$$ where ##\chi## and ##\chi_0## are the characters of ##\rho## and ##\rho_0##, respectively. Since all group elements in the same conjugacy class have the same characters, this may be...
Back
Top