Show simple item record  

dc.contributor.authorWilson, William J.
dc.date.accessioned2008-10-23T01:34:17Z
dc.date.available2008-10-23T01:34:17Z
dc.date.issued1994-03
dc.identifier.citationWilson, W.J. (1994). Chinks in the armor of public key cryptosystems. (Working paper 94/03). Hamilton, New Zealand: University of Waikato, Department of Computer Science.en_US
dc.identifier.issn1170-487X
dc.identifier.urihttps://hdl.handle.net/10289/1132
dc.description.abstractPotential weaknesses in public key cryptosystem design and use are identified with emphasis on a particular vulnerability resulting from the encryption of ordinary natural language plaintext. This weakness occurs when an insufficiently long block length is used to encrypt low entropy natural language and ordinary numeric plaintext rendered in 8-bit character sets such as ASCII or EBCDIC. A computer-assisted, semi-exhaustive chosen plaintext attack is defined and shown to defeat such systems. Several methods are suggested for thwarting such attacks by maximizing input plaintext entropy prior to encryption.en_US
dc.format.mimetypeapplication/pdf
dc.language.isoen
dc.relation.ispartofseriesComputer Science Working Papers
dc.subjectpublic key cryptosystemsen_US
dc.subjectblock ciphersen_US
dc.subjectmessage entropyen_US
dc.subjectunicity distanceen_US
dc.subjectexhaustive enumerationen_US
dc.subjectn-gramsen_US
dc.subjectASCIIen_US
dc.subjectEBCDIC character setsen_US
dc.titleChinks in the armor of public key cryptosystemsen_US
dc.typeWorking Paperen_US
uow.relation.series94/03


Files in this item

This item appears in the following Collection(s)

Show simple item record