Proceedings of the 13th ACM Conference on Computer and Communications Security 2006
DOI: 10.1145/1180405.1180435
|View full text |Cite
|
Sign up to set email alerts
|

A natural language approach to automated cryptanalysis of two-time pads

Abstract: While keystream reuse in stream ciphers and one-time pads has been a well known problem for several decades, the risk to real systems has been underappreciated. Previous techniques have relied on being able to accurately guess words and phrases that appear in one of the plaintext messages, making it far easier to claim that "an attacker would never be able to do that." In this paper, we show how an adversary can automatically recover messages encrypted under the same keystream if only the type of each message … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 18 publications
0
8
0
Order By: Relevance
“…N-gram analysis [18,27] can be used in conjunction with frequency analysis or on its own. Like frequency analysis, lists of n-character strings, or n-grams, can be tallied from a representative training set.…”
Section: Common Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…N-gram analysis [18,27] can be used in conjunction with frequency analysis or on its own. Like frequency analysis, lists of n-character strings, or n-grams, can be tallied from a representative training set.…”
Section: Common Methodsmentioning
confidence: 99%
“…The two-time-pad problem [27] describes how a key is reused to encrypt two plaintexts P and P', where P ⊕ key and P' ⊕ key can be XORed to recover P ⊕ P'. Although XOR-based streamcipher attacks are well-known, these weaknesses have not stopped storage designers from using fast encryption modes to support efficient random in-place updates without re-encrypting the remaining file after the updated file location.…”
Section: Contributions and Non-contributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…The usage of the same counter value T 0 in combination with the same group key can break the confidentiality of group communication because of the "Two-Time-Pad problem" [11].…”
Section: Counter Repetition In Aes-ctrmentioning
confidence: 99%
“…This procedure is not explicitly described. The only description given on the sequence number is quoted as follows and does not refer to resynchronization: "To ensure data integrity and data freshness, HMAC [11] in combination with SHA 256 [12] and a sequence number are used." [2].…”
Section: Resynchronization Of Sequence Counter Left Openmentioning
confidence: 99%