home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!haven.umd.edu!darwin.sura.net!zaphod.mps.ohio-state.edu!pacific.mps.ohio-state.edu!linac!uwm.edu!ogicse!qiclab!leonard
- From: leonard@qiclab.scn.rain.com (Leonard Erickson)
- Newsgroups: sci.crypt
- Subject: Re: Attack Methods
- Message-ID: <1992Nov18.134243.24089@qiclab.scn.rain.com>
- Date: 18 Nov 92 13:42:43 GMT
- Article-I.D.: qiclab.1992Nov18.134243.24089
- References: <1992Nov11.213535.17788@csc.ti.com>
- Reply-To: Leonard.Erickson@f51.n105.z1.fidonet.org
- Organization: SCN Research/Qic Laboratories of Tigard, Oregon.
- Lines: 26
-
- jdailey@dadd.ti.com (Jim Dailey) writes:
-
- >So what are some of the methods used to attack an encrypted text, when the
- >encryption method is unknown?
-
- First you run frequency tests. This will tell you *immediately*
- if a "reasonably sized" text was encrypted via *any* character
- transposition cipher.
-
- Then you run statistical tests. These can identify the key length
- in character based substitution ciphers.
-
- Once you have the key length (unless it's long enough to have only been
- used a *very* few times in the length of the message) you can start
- solving the message as bunch of different *simple* substitution
- ciphers.
-
- I assume that there are methods for the "fancier" sort of cipher, but
- for most folks, these do the job nicely. Alas, I misplaced the
- disk with the programs on it and I haven't re-worked them from the
- book again.
- --
- Leonard Erickson leonard@qiclab.scn.rain.com
- CIS: [70465,203] 70465.203@compuserve.com
- FIDO: 1:105/51 Leonard.Erickson@f51.n105.z1.fidonet.org
- (The CIS & Fido addresses are preferred)
-