[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: fast des



	 
	 > Run your plaintext through compress first; remove the compress
	 > header; then encrypt. Compression will screw up character frequencie
	s
	 > (and use all eight bits) enough to make automated detection of a
	 > successfully-broken encryption really darn hard. Especially if you
	 > keep changing compression technology each message.

	 Most encryption scheams use cypher block chaining or some other
	 mechanism where a change in one block will affect every block to
	 come after it, no?

	 Given this, would inserting a block of random data at the begining
	 of the datastream help?


Probably not.  The DES-crackers are already going to be looking at a
couple of blocks, because in general, the cryptanalyst won't know the IV.
But not knowing it only affects your ability to decrypt the very next block;
you can still get the one after it.

The decrypt equation for CBC mode is

	P[n] <- D(C[n]) xor C[n-1]

That is, without knowing the IV -- C[0] -- you can't recover P[1].
But P[2] depends only on C[2] and C[1].  If P[1] is random garbage,
you've actually made life a bit easier -- the block they can't recover
isn't important.