Zip attacks with reduced known plaintext

8Citations
Citations of this article
45Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Bihamand Kocher demonstrated that the PKZIP streamcipher was weak and presented an attack requiring thirteen bytes of plaintext. The deflate algorithm“zipp ers” now use to compress the plaintext before encryption makes it difficult to get known plaintext. We consider the problemof reducing the amount of known plaintext by finding other ways to filter key guesses. In most cases we can reduce the amount of known plaintext fromthe archived file to two or three bytes, depending on the zipper used and the number of files in the archive. For the most popular zippers on the Internet, there is a fast attack that does not require any information about the files in the archive; instead, it gets doubly-encrypted plaintext by exploiting a weakness in the pseudorandom-number generator.

Cite

CITATION STYLE

APA

Stay, M. (2002). Zip attacks with reduced known plaintext. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2355, pp. 125–134). Springer Verlag. https://doi.org/10.1007/3-540-45473-X_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free