A Known Plaintext Attack on the PKZIP Stream Cipher

نویسندگان

  • Eli Biham
  • Paul C. Kocher
چکیده

Table 3. Complexity of the attack by the size of the known plaintext and any other le which is encrypted by the same key. This known plaintext attack breaks the cipher using 40 (compressed) known plaintext bytes, or about the 200 rst uncompressed bytes (if the le is compressed), with complexity 2 34. Using about 10000 known plaintext bytes, the complexity is reduced to about 2 27. Table 3 describes the complexity of the attack for various sizes of known plaintext. The original key (password) can be constructed from the internal representation. An implementation of this attack in software was applied against the PKZIP cipher contest. It found the key \f7 30 69 89 77 b1 20" (in hexadecimal) within a few hours on a personal computer. A variant of the attack requires only 13 known plaintext bytes, in price of a higher complexity 2 38. Since the last two bytes (one in version 2.04g) of the 12 prepended bytes are always known, if the known plaintext portion of the le is in its beginning, the attack requires only 11 (12) known plaintext bytes of the compressed le. (In version 1.10 several additional prepended bytes might be predictable, thus the attack might actually require even fewer known plaintext bytes.) We conclude that the PKZIP cipher is weak and that it should not be used to protect valuable information. References 1. PKWARE, Inc., General Format of a ZIP File, technical note, included in PKZIP 1.10 distribution (pkz110.exe: le appnote.txt). Table 2. Complexity of nding the key itself 3.6 The Key (Password) The internal representation of the key suuces to break the cipher. However, we can go even further and nd the key itself from this internal representation with the complexities summarized in Table 2. The algorithm tries all key lengths 0, 1, 2, : : : , up to some maximal length; for each key length it does as described in the following paragraphs. For l 4 it knows key0 1?l and key0 1. Only l 4 key bytes are entered to the crc32 calculations that update key0 1?l into key0 1. Crc32 is a linear function, and these l 4 key bytes can be recovered, just as key0 n , : : : , key0 n?3 recovered above. Given the l key bytes, we reconstruct the internal representation, and verify that we get key1 1 and key2 1 as expected …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Known Plaintext Attack on the PKZIP Stream

Abs t r ac t . The PKZIP program is one of the more widely used archive/ compression programs on personM, computers. It also has many compatible variants on other computers~ and is used by most BBS's and ftp sites to compress their archives. PKZIP provides a stream cipher which allows users to scramble files with variable length keys (passwords). In this paper we describe a known pla.intext att...

متن کامل

ZIP Attacks with Reduced Known Plaintext

Biham and Kocher demonstrated that the PKZIP stream cipher was weak and presented an attack requiring thirteen bytes of plaintext. The deflate algorithm “zippers” now use to compress the plaintext before encryption makes it difficult to get known plaintext. We consider the problem of reducing the amount of known plaintext by finding other ways to filter key guesses. In most cases we can reduce ...

متن کامل

Cryptanalysis of Hiji-bij-bij (HBB)

In this paper, we show several known-plaintext attacks on the stream cipher HBB which was proposed recently at INDOCRYPT 2003. The cipher can operate either as a classical stream cipher in the “B mode” or as an asynchronous stream cipher in the “SS mode”. In the case of the SS mode, we present known-plaintext attacks recovering 128-bit key with the complexity 2 and 256-bit key with the complexi...

متن کامل

Practical Polynomial Time Known Plaintext Attacks on a Stream Cipher Proposed by John Nash

In this paper we present two known plaintext attacks on a stream cipher which was developed by John Nash in the early 1950’s but whose design was declassified by the NSA only in 2012. The main attack reduces the claimed security of the scheme from ((n− 1)! · 2) to

متن کامل

Cryptanalysis of the Vesta-2M Stream Cipher

In this paper the security of the stream cipher Vesta-2M is investigated. Cryptanalytic algorithm is developed for a known plaintext attack where only a small segment of plaintext is assumed to be known. The complexity the attack is estimated the time of searching through the square root of all possible initial states.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1994