
Clark Reynard writes:
This may or may not be one of those papers: Martin Kochanski: "A Survey of Data Insecurity Packages" in Deavours et al., Cryptology, pp. 195 - 209. None of the encryption methods analyzed by Kochanski were particularly complex, even though it did take skill to crack most of them. It turns out that in each case the encryption algorithm used is fairly easy to state (in, say, half a page). Perry Metzger writes:
So far the DE method has not been well-examined, except by its developers (who have spent years on this). I took a step toward public examination of the method by posting the natural language description here on cypherpunks a few weeks ago. (Anyone who missed it can get it from me.) This description has been available in the manual for a year now, for anyone who cared to purchase the product. It has also been examined by four cryptologists (professional and/or credentialed) not involved in its development, and it was ridiculed by none of them. As I said, the complete details are in the C code, which is available at present to anyone who purchases the library, and which will be made public sometime down the road. Of course, any crypto system must be made available to public examination before it can be judged strong or otherwise. If I didn't think the DE encryption method was strong I wouldn't be making it public. Just because we have DES and IDEA doesn't mean we should be satisfied with them only. The first task of a cryptanalyst is to discover what method of encryption was used. If that is known (and solving this problem itself may be non-trivial) then cryptanalysis may proceed either by (i) a study of patterns in the ciphertext or (ii) a thorough study of the encryption method used. Statistical tests have not revealed any patterns in DE-encrypted ciphertext so far. We'll see whether analysis of the DE method by others reveals any flaws. Until then I'm reminded of the saying: "Those who can, do; those who can't, criticise." This brings up an interesting question: what charactersistics, if any, do different encryption methods produce in ciphertext? From a study of several large samples of ciphertext produced by a particular encryption method, what clues might there be to the identity of the encryption method used? I'd like to hear if anyone knows of any published work which addresses this question. Since DES in electronic code book mode (which is considered insecure) encrypts 8-byte chunks which are independent of each other, it's entirely possible that the ciphertext can be identified as the product of DES-ECB.

I hear the sounds of autonecrothaphty (digging one's own grave). Was it recommended by any of them, and did any of the test it?
The first task of a cryptanalyst is to discover what method of encryption was used.
Usually not. This often comes as collateral information related to the intercept. In the case of a PC seizure, having a manual lying around and an executable on the disk usually qualifies. Eric
participants (2)
-
Eric Hughes
-
meyer