Results 1 to 3 of 3

Thread: Decoding TwoFish Encryption

  1. #1

    Question Decoding TwoFish Encryption

    I have a problem that I've been working on for a little while and I wanted to know what you guys thought about this.

    I know TF128 is pretty difficult to crack by brute strength but my problem is slightly different.

    I want to know if it is possible to retreive the key if you knew what a portion of the file looked like. To elaborate further, assume I have a tf encrypted file A.tf
    If I know what the first 100 bytes of file A are i.e unencrypted, then does this make it easier to obtain the keys? (Aside from allowing me to use a smaller portion of the file to do a brute strength attack on)

    Just curious.

    Sailor_EDA

  2. #2
    What you're referring to is called "Known plaintext attack" and good (a.k.a. strong) cryptographic systems are/should be immune to it.

    To answer your question:
    • From a practical point of view, it doesn't.
    • From a theoretical one, it may (as in very unlikely, but who knows). You've several blocks of ciphertext and its corresponding plaintext (6 or 12 depending on the blocksize used by the TF implementation) which is slightly better than a ciphertext only attack


    If you can find a way to derive any information about the key using this attack, then you can claim to have broken Twofish and you will be famous

    From Wikipedia (http://en.wikipedia.org/wiki/Known-plaintext_attack):

    The known-plaintext attack is a cryptanalytic attack in which the attacker has samples of both the plaintext and its encrypted version (ciphertext) and is at liberty to make use of them to reveal further secret information; typically this is the secret key.

    At Bletchley Park in World War II, strenuous efforts were made to use, and even force the Germans to produce messages with, known plaintext. The known plaintexts were called "cribs", and schemes to force the Germans to produce them were called "gardening".


    If you search the board for known plaintext you'll find more info like http://www.woodmann.net/forum/showthread.php?t=4141

    Hope this helps.

  3. #3
    Thanks for the response. That was pretty informative.

    Sailor_EDA

Similar Threads

  1. MIPS Decoding and Disassembly
    By peterg70 in forum Advanced Reversing and Programming
    Replies: 4
    Last Post: July 14th, 2007, 20:28
  2. IDA Decoding problem
    By bboitano in forum Tools of Our Trade (TOT) Messageboard
    Replies: 3
    Last Post: March 16th, 2006, 04:13
  3. Encryption used in CRT
    By Kilby in forum RCE Cryptographics
    Replies: 13
    Last Post: July 25th, 2002, 17:21
  4. Java Encryption
    By Killerkris in forum Advanced Reversing and Programming
    Replies: 0
    Last Post: January 21st, 2001, 06:53
  5. Encryption Lite
    By hafer in forum Advanced Reversing and Programming
    Replies: 2
    Last Post: January 14th, 2001, 19:11

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •