Ciphertexts Clustering is Equivalent to Plaintexts Clustering

W. A. R. Souza, L. A. V. Carvalho, J. A. Xexéo
{"title":"Ciphertexts Clustering is Equivalent to Plaintexts Clustering","authors":"W. A. R. Souza, L. A. V. Carvalho, J. A. Xexéo","doi":"10.1109/STIL.2009.21","DOIUrl":null,"url":null,"abstract":"Several studies have been made in attempt to break confidentiality, either by obtaining the knowledge of the plaintext or the key itself working only with cryptograms. However, there is not known methods capable of breaking contemporary cryptographic algorithms, as DES and AES. Nevertheless, in order to benefit cryptanalysts, it is possible to search weakness in these algorithms. In this work we show that ciphertexts can be considered as plaintexts written in an unknown idiom and using a binary alphabet, where each idiom is determined by the cryptographic key. In the experiments with ciphertexts and plaintexts clustering it have reached success, since all ciphertexts encrypted with the same key belong to the same group, as well as, plaintexts, written in the same idiom and alphabet belong to the same group. This result exposes a cryptographic algorithms weakness, since they are designed to generate ciphertexts without any relation with the input data, such as the plaintext or the cryptographic key.","PeriodicalId":265848,"journal":{"name":"2009 Seventh Brazilian Symposium in Information and Human Language Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Seventh Brazilian Symposium in Information and Human Language Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/STIL.2009.21","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Several studies have been made in attempt to break confidentiality, either by obtaining the knowledge of the plaintext or the key itself working only with cryptograms. However, there is not known methods capable of breaking contemporary cryptographic algorithms, as DES and AES. Nevertheless, in order to benefit cryptanalysts, it is possible to search weakness in these algorithms. In this work we show that ciphertexts can be considered as plaintexts written in an unknown idiom and using a binary alphabet, where each idiom is determined by the cryptographic key. In the experiments with ciphertexts and plaintexts clustering it have reached success, since all ciphertexts encrypted with the same key belong to the same group, as well as, plaintexts, written in the same idiom and alphabet belong to the same group. This result exposes a cryptographic algorithms weakness, since they are designed to generate ciphertexts without any relation with the input data, such as the plaintext or the cryptographic key.
密文聚类等同于明文聚类
为了打破机密性,已经进行了几项研究,要么是通过获取明文的知识,要么是密钥本身只与密码一起工作。然而,目前还没有已知的方法能够破解像DES和AES这样的现代加密算法。然而,为了使密码分析人员受益,可以搜索这些算法中的弱点。在这项工作中,我们表明密文可以被认为是用未知的习语和使用二进制字母表编写的明文,其中每个习语由加密密钥决定。在密文和明文聚类的实验中取得了成功,因为所有用相同密钥加密的密文都属于同一组,使用相同习语和字母的明文也属于同一组。这个结果暴露了加密算法的弱点,因为它们被设计为生成与输入数据(如明文或加密密钥)没有任何关系的密文。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信