In: Computer Science
Consider the one-time pad with messages and key-streams both being binary sequences. Suppose that the system is used erroneously, so that two messages have been encrypted using the same key. What information can an adversary that hears the two ciphertexts deduce about the plaintexts? Show this mathematically using EXOR logic
Ans:
1: The on one occasion protection in the midst of mail and key-streams both double sequence. here the scheme is used incorrectly so that two mail have been encrypted by the similar type.
If the two mail have been encrypted using the similar type then the keystream use again in stream ciphers.
2: And here the once pads risk to bona fide systems has been not doing well since the past techniques have been relied on deduction terms and phrases which are emerge in one of the plaintext messages and so by making it easier.
we can say that the invader cannot do encrypting using the similar type.
3: What in order can an adversary that hears the two ciphertexts deduce about the plaintexts?
The information is that they were both encrypted with the similar type. And attack by encrypting and uncovering the plain text by follow steps like.
By Guessing a word so as to may appear in one of the mail.
By Encoding the statement from step 1 to a magic charm string.
By XOR the two cipher-text messages
By XOR the magic charm string from step 2 at each position of the XOR of the two cipher-texts from step 3.
4: When the answer from step 4 is clear text we guess the English word and expand our crib explore.
If the result is not readable text we try an XOR of the copy word at the next position.
So the casual generated key and combining it with the plaintext to form the ciphertext. If it is used more than formerly then we could find out how the key and plaintext are being used to form the ciphertext then develop this to deduce the plain copy