Publication:
Chinks in the armor of public key cryptosystems

dc.contributor.authorWilson, William J.
dc.date.accessioned2008-10-23T01:34:17Z
dc.date.available2008-10-23T01:34:17Z
dc.date.issued1994-03
dc.description.abstractPotential weaknesses in public key cryptosystem design and use are identified with emphasis on a particular vulnerability resulting from the encryption of ordinary natural language plaintext. This weakness occurs when an insufficiently long block length is used to encrypt low entropy natural language and ordinary numeric plaintext rendered in 8-bit character sets such as ASCII or EBCDIC. A computer-assisted, semi-exhaustive chosen plaintext attack is defined and shown to defeat such systems. Several methods are suggested for thwarting such attacks by maximizing input plaintext entropy prior to encryption.en_US
dc.format.mimetypeapplication/pdf
dc.identifier.citationWilson, W.J. (1994). Chinks in the armor of public key cryptosystems. (Working paper 94/03). Hamilton, New Zealand: University of Waikato, Department of Computer Science.en_US
dc.identifier.issn1170-487X
dc.identifier.urihttps://hdl.handle.net/10289/1132
dc.language.isoen
dc.relation.ispartofseriesComputer Science Working Papers
dc.subjectpublic key cryptosystemsen_US
dc.subjectblock ciphersen_US
dc.subjectmessage entropyen_US
dc.subjectunicity distanceen_US
dc.subjectexhaustive enumerationen_US
dc.subjectn-gramsen_US
dc.subjectASCIIen_US
dc.subjectEBCDIC character setsen_US
dc.titleChinks in the armor of public key cryptosystemsen_US
dc.typeWorking Paperen_US
dspace.entity.typePublication
uow.relation.series94/03

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
uow-cs-wp-1994-03.pdf
Size:
1.4 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.8 KB
Format:
Item-specific license agreed upon to submission
Description: