home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!think.com!ames!agate!sprite.berkeley.edu!shirriff
- From: shirriff@sprite.berkeley.edu (Ken Shirriff)
- Newsgroups: sci.crypt
- Subject: Re: New Encryption Method - A Challenge!
- Date: 17 Nov 1992 21:28:43 GMT
- Organization: University of California, Berkeley
- Lines: 16
- Message-ID: <1ebo6bINNon3@agate.berkeley.edu>
- References: <n0e49t@ofa123.fidonet.org>
- NNTP-Posting-Host: hijack.berkeley.edu
-
- In article <n0e49t@ofa123.fidonet.org> Erik.Lindano@ofa123.fidonet.org writes:
- > Ok, fair enough. Short of revealing how the program works, what
- > terms would you like?
-
- Well, if I had the time and interest to break your encryption scheme, what I
- would do is a chosen ciphertext attack. That is, I would run the ciphertext
- through your decoding program and look at the output text. Then I would
- change a byte in the ciphertext and see how the decoded text changes. I would
- keep doing this to see how much I can figure out about the decoding method.
- Does changing a byte in the ciphertext change one byte or a few bytes in the
- output, or does it change the whole output? Can I figure out if some bytes
- are the key and some bytes are the data? Can I figure out how big the key is?
- Does the output change in a simple way based on the input change, e.g.
- arithmetically or logically?
-
- Ken Shirriff shirriff@sprite.Berkeley.EDU
-