In this article, I’m dissecting a very well-known (and that’s why not advisable to be used) cryptographic algorithm which is better known for IT tribe as “ROT13”.
DES - Symmetric. Data Encryption Standard. NIST 1993. 56 bit key, 64-bit plaintext input (blocks). How secure? Can be brute-forced in 4 months. No known “backdoor” decryption approach. To make it more secure, change keys every 3 months, use 3 keys, use cipher-block chaining.
One-time pad is like a Viginear cypher but with the key the length of the cypher text.
The key requirement for this cypher scheme to be perfectly secret is that the key should only be used once. Why? For example, the same key was applied to two cypher texts (c1 and c2), so that c1 = message1 XOR key and c2 = message2 XOR key. What can we do here? We can eliminate the key by XOR-ing c1 and c2: c1 XOR c2 = (message1 XOR key) XOR (message2 XOR key) = message1 XOR message2. This is not the same as having the plain text of either or both message1 or message2, but there is something we can do, using ASCII characteristics (it’s if it were ASCII, of course). Each letter starts with 01 in binary, but the space character starts with 00. Look at the possible combinations:
In this article I’m trying to study how keychain works.
There once lived a monkey 🐒 George. He was a nice fellow, but his memory suck too much and caused him a lot of trouble. He also was very absent-minded and has lost some of his secret keys. He met a bird 🐔 Marvin and said: “Marvin, my memory is no good, here are all my keys 🔑🔑🔑🔑 , I will just retain this small key-card 🎴 which I will show you to prove it’s really me. Whenever I need a key, I’ll show you this card. You give me the key 🔑 temporary and then take it back after I used it 🔐 .”. Marvin was a very responsible guy and he agreed.