Skip to main content
Log in

Partially identified Babassu cipher and attack on it

  • Original Paper
  • Published:
Journal of Computer Virology and Hacking Techniques Aims and scope Submit manuscript

Abstract

In the present article, we consider a new class of one-pad ciphers. We define its encryption algorithm as a partial function with two arguments. The first argument is a key, which is a random and equiprobable sequence of natural language letters. The length of the key is N. The second argument is a coherent (readable) text of length L, where L < N. The partiality feature of the encryption function does not allow us to apply C. Shannon's mathematical model. For this class of ciphers, we present two operational modes. We chose positions (numbers) of letters in a given key with the encrypted coherent text in the first mode. The positions (numbers) of letters represent the encrypted text. If there is not enough key information to encrypt the whole text, we may repeat the encryption using the next chosen key. To illustrate cryptographic capabilities of this mode, we widely use a widely known perfect cipher secrecy concept of C. Shannon as a prototype to the concept of perfect partial secrecy. Newly presented concepts allow us to build a hypothesis stating that it is impossible to decrypt the presented cipher without finding the information about its key. The second operational mode of the cipher consists of multiple usage of the key to save the key information. We also calculate the complexity of finding the key.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. J. Katz, Y. Lindell. Introduction to modern cryptography, 2008, p. 553. https://www.researchgate.net/publication/220688729_Introduction_to_Modern_Cryptography (30.07.2019).

  2. Babash, A.V., Shankin, G.P.: Cryptography. Aspects of defense. SOLON-R, Moscow (2002)

    Google Scholar 

  3. Babash, A.V.: Cryptographic and automaton-theoretic aspects of modern information security. Cryptographic protection methods. Publishing Center EAOI, Moscow (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. V. Babash.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Babash, A.V., Baranova, E. Partially identified Babassu cipher and attack on it. J Comput Virol Hack Tech 18, 271–274 (2022). https://doi.org/10.1007/s11416-022-00418-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11416-022-00418-1

Keywords

Navigation