Advertisement

Automatic Control and Computer Sciences

, Volume 53, Issue 1, pp 39–44 | Cite as

Security Evaluation of a Brute-force Attack on a Cipher Using a Statistical Criterion for Plaintext

  • A. V. Babash
  • V. A. SizovEmail author
  • A. A. Mikryukov
Article
  • 11 Downloads

Abstract

The paper presents calculations of the amount of effort and the reliability of the method of brute-force attack on a cipher using a statistical criterion for plaintexts, which has type 1 and type 2 errors. Calculated values of parameters of the discussed cryptanalysis methods for a cipher allows better predictions of its remaining safe operational life taking into account statistical characteristics for recognizing the plaintext and changes in the communication channel parameters.

Keywords:

cryptography cipher key decryption brute force attack 

REFERENCES

  1. 1.
    Banks, M.J., A Search-Based Tool for the Automated Cryptanalysis of Classical Ciphers, 2008.Google Scholar
  2. 2.
    Encyclopedia of Cryptography and Security, van Tilborg, H.C.A., Ed., Springer Science+Business Media, Inc., 2005.Google Scholar
  3. 3.
    Schneier, B., Applied Cryptography: Protocols, Algorithms, and Source Code in C, 1993.Google Scholar
  4. 4.
    Katz, J. and Lindell, Y., Introduction to Modern Cryptography, CRC Press, 2015, 2nd ed.zbMATHGoogle Scholar
  5. 5.
    Lukanin, A.V., Automatic Processing of Natural Language, Chelyabinsk: SUSU, 2011.Google Scholar
  6. 6.
    Graham, R.D., Password Cracking, Mining, and GPUs, 2011.Google Scholar
  7. 7.
    Shannon, C., Works on Information Theory and Cybernetics, Moscow: Inostr. Liter., 1963.Google Scholar
  8. 8.
    Neyman, J. and Pearson, E.S., On the problem of the most efficient tests of statistical hypotheses, Philos. Trans. R. Soc., A, 1933, vol. 231, pp. 289–337.Google Scholar
  9. 9.
    Menezes, A.J., Van Oorschot, P., and Vanstone, S., Handbook of Applied Cryptography, New York: CRC Press, 1996.CrossRefzbMATHGoogle Scholar
  10. 10.
    Rasoolzadeh, S., Ahmadian, Z., Salmasizadeh, M., and Aref, M.R., Total break of Zorro using linear and differential attacks, IACR Cryptol. ePrint Arch., 2014, vol. 220. http://eprint.iacr.org/2014/220.Google Scholar
  11. 11.
    Van Lint, J.H. and Wilson, R.M., A Course in Combinatorics, Cambridge University Press, 2001.CrossRefzbMATHGoogle Scholar
  12. 12.
    Hongjun Wu and Bart Preneel, Differential cryptanalysis of the stream ciphers Py, Py6 and Pypy cryptology, EUROCRYPT, 2007, pp. 276–290.zbMATHGoogle Scholar
  13. 13.
    Differential cryptanalysis and linear distinguisher of full-round Zorro, Applied Cryptography and Network Security—ACNS 2014; Lect. Notes Comput. Sci., 2014, vol. 8479, pp. 308–323.Google Scholar
  14. 14.
    Biham, E., New type of cryptanalytic attacks using related key, EUROCRYPT'93; Lect. Notes Comput. Sci., 1994, vol. 765, pp. 229–246.zbMATHGoogle Scholar
  15. 15.
    NIST, Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, (Archive 23.01.2012) Special Publication 800-67, p. 14.Google Scholar
  16. 16.
    Fluhrer, S., Mantin, I., and Shamir, A., Weaknesses in the key scheduling algorithm of RC4, Eighth Annual Workshop on Selected Areas in Cryptography (August 2001). http://citeseer.ist.psu.edu/fluhrer01weaknesses.html. Accessed September 17, 2001.Google Scholar
  17. 17.
    Zheng, Y. and Wu, W., Biclique Attack of Block Cipher SKINNY, Information Security and Cryptology. Inscrypt 2016; Lect. Notes Comput. Sci., 2017, vol. 10143.Google Scholar
  18. 18.
    Çoban, M., Karakoç, F., and Boztas, Ö., Biclique Cryptanalysis of TWINE, Cryptology and Network Security. CANS 2012; Lect. Notes Comput. Sci., 2012, vol. 7712.Google Scholar
  19. 19.
    Rechberger, C., On bruteforce-like cryptanalysis: New meet-in-the-middle attacks in symmetric cryptanalysis, Information Security and Cryptology—ICISC 2012; Lect. Notes Comput. Sci., 2013, vol. 7839.Google Scholar
  20. 20.
    Babash, A.V., Cryptographic and Theoretical Automaton Aspects of Modern Information Protection, Moscow: International Consortium “Electronic University,” Eurasian Open Institute, MESI, 2008, vol. 1.Google Scholar

Copyright information

© Allerton Press, Inc. 2019

Authors and Affiliations

  1. 1.Plekhanov Russian University of EconomicsMoscowRussia

Personalised recommendations