Questions tagged [known-plaintext-attack]

KPA is a form of cryptanalysis where the attacker can compare plaintext massages with the resulting ciphertext in order to find statistical weaknesses in the cipher or determine the private key. KPA resistance is a considered a must-have property for any modern cipher.

As a fun historical note, the most famous cryptanalysis (or code-breaking) of all time - British cracking of the German Enigma machine during World War 2 was an example of a known plaintext attack. British intelligence used known bits of plaintext - called "cribs" - such as the weather report at the beginning of a message, or the "Heil Hitler" at the end in order to reduce the search-space for breaking each day's private encryption key.

10 questions
4
votes
1 answer

Security of AES against known plaintext attack if no IV is used?

I understand the the statement that "AES is not currently vulnerable to known-plaintext attack" but I assume that there is an implicit rider in that statement that should be read "when used in an appropriate mode AES is not currently vulnerable to…
2
votes
1 answer

Reversing a block hash of SHA-1 with known Plaintext?

Is it possible to reverse the hashing of a block in a Datastream fed to an SHA1 if the plaintext for that block is known? If it is not possible (which I assume) does it make attacks to retrieve the state easier? An example what I'm trying to figure…
Patrick Huy
  • 123
  • 4
1
vote
1 answer

Can I get AES CBC key from known plaintext, ciphertext, iv?

Long story short: I was using AES CBC PKCS5 on my image server, but I lost my keys (one key per image). I know the first 61 bytes (the original and the encrypted) of each image plus I know the IV, and the key length is 256. My question is that can I…
Mk Domain
  • 11
  • 1
1
vote
0 answers

Partial plaintext with pkcrack

First off, I know very little about cryptography, as I am sure my post below makes clear. The short version is I presume I need to use the -o (offset) function of pkcrack, but I'm not sure how to work out what offset I need. I have an old .wmv file…
1
vote
1 answer

Will using CTR mode with unique IVs, but only one password for encrypting multiple files, leak data or keys?

I'm working on a project to encrypt many files with a single password. The steps I will employ to encrypt the files are: user will execute a command similar to tool --encrypt --recurse directories/to/recurse and-other-files.txt the user will be…
1
vote
2 answers

Close Port 587 - Ramifications?

Our recent PCI scan failed because "Plaintext authentication is allowed over unencrypted channel on SMTP." As such, our tech support suggested to close port 587. What are the effects of closing port 587, and will it negatively affect…
1
vote
3 answers

Is symmetric encryption vulnerable to known plaintext attack?

If Bob sends some plaintext to Alice for encryption before sending the ciphertext to Carol, can Bob deduce the key by comparing the plaintext and ciphertext assuming only Alice and Carol knows the key and it is a symmetric encryption scheme?
John
  • 75
  • 1
  • 2
0
votes
2 answers

Do known plaintext attacks lead to exposure of the key?

I say that if a professional code breaker has a bunch of data, the encoded version of said data and the encoding method he can figure out the encoding key. It is just a matter of having enough data. Is this true? How much data or how many…
0
votes
2 answers

Is it safe to encrypt some data which contains a uuid while also sending the uuid as metadata?

I have a json data-interchange format where I send messages like the following: { "revision": { "client": "f0ede1da-7314-4e59-99f7-a3a71dcab11f", patch: ["hello world", 0] }, "client": "f0ede1da-7314-4e59-99f7-a3a71dcab11f", "version":…
brainkim
  • 103
  • 2
-1
votes
2 answers

Is possible to reverse engineer a AES encryption of a known file format?

If the encrypted file is from one of the known formats, such as doc, jpg, mp3, etc., is it possible to reverse engineer it and decrypt it? I "roughly" know the mechanic behind the AES encryption: Matrix operation, Row shifting, Column shuffling, all…