Abstract
This paper will propose a natural language model based on all coherent (meaningful) texts of fixed length used in encryption. We use Shannon's cipher model to describe XOR ciphers by incorporating equinumerous alphabets of plaintexts, keys, and ciphertexts. The encryption function between the plaintext alphabet and the key should be defined as bijective with regard to each variable. The selection of key symbols from the key alphabet to encrypt a text of finite length is made randomly (and possibly randomly and with equal probability). The supposed attack consists of identifying at least two plaintext segments with a given length D in a known ciphertext of a given length. Further, we will estimate the complexity of the attack and calculate the reliability of the attack lower estimate.
Similar content being viewed by others
References
Babash, A.V., Baranova, E.K.: Assumptions and approximation models in public key cryptography. Is it possible to believe the results and conclusions? Methods and means of technical security of information. In: Proceedings of the 26th Scientific and Technical Conference, Saint-Petersburg. June 26–29, 2017, Saint-Peterburg, Polytechnic University Press, pp. 30–32 (2017)
Babash, A.V., Baranova, E.K.: Selected issues of cryptanalysis of random keystream cipher. Methods and technical means of information security. In: Proceedings of the 28th Scientific and Technical Conference, Saint-Petersburg. June 24–27, 2019, Saint-Petersburg, Polytechnic University Press, pp. 76–77 (2019)
Babash, A.V., Sizov, V.A., Baranova, E.K., Mikrukov, A.A.: Theoretically unbreakable ciphers as they should be understood. Theor. Quest. Comput. Sci. Comput. Math. Comput. Sci. Cogn. Inf. 14(3), 573–577 (2018)
Babash, A.V., Shankin, G.P.: Cryptography. Aspects of defense. SOLON-R, Moscow (2007)
Shannon, C.: Communication theory of secrecy systems. Bell Syst. Techn. J. 28(4), 656–715 (1949)
Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to algorithms 3. The MIT Press, Cambridge (2009)
J. Katz, Y. Lindell. Introduction to modern cryptography, p. 553 (2008)
Hellman, E.: Privacy and authentication: an introduction to cryptography. Proc. IEEE 67(3), 32 (1979)
Claude Elwood Shannon (1916–2001) / S. Golomb [и дp.]. Notices of the American Mathematical Society, January. pp. 8–16 (2002)
Schneier, B.: Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C by Wiley Computer Publishing, p. 666. Wiley (1996)
Martin, K.M.: Everyday Cryptography (aнгл.). Oxford University Press (2012)
Kasiski, F.W.: Die Geheimschriften und die Dechiffrir-Kunst. Mittler & Sohn, Berlin (1863)
Menezes, A. J. (Alfred J.): Handbook of Applied Cryptography. CRC Press, Boca Raton, xxviii, 780 pages (1997)
Friedman, W.F.: The Index of Coincidence and Its Applications in Cryptology. Riverbank Laboratories, Geneva (1922)
Babash, A.V.: Cryptographic Methods of Information Protection, vol. 1, p. 413p. RIOR INFRA-M, Moscow (2013)
https://www.blackhat.com/html/bh-eu-10/bh-eu-10-archives.html#Filiol
Filiol, E.: How to operationally detect misuse or flawed implementation of weak stream ciphers (and even block ciphers sometimes) and break them -Application to the Office Encryption Cryptanalysis, ESIEA Laval Operational Cryptology and Virology Lab (C + V)O http://www.esiea-recherche.eu/
Dodge, Y.: Premiers pas en statistiques. Springer France Publishing (1999)
Babash, A.V.: Attacks on the random gamming cipher Problems of information security. Comput. Syst. 3, 74–81 (2020)
Babash, A.V.: Attacks on the random gamming cipher. Math. Math. Model. 6(219), 35–58 (2020)
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Babash, A.V. XOR ciphers model and the attack to it. J Comput Virol Hack Tech 18, 275–283 (2022). https://doi.org/10.1007/s11416-022-00419-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11416-022-00419-0