[XML-DEV Mailing List Archive Home] [By Thread] [By Date] [Recent Entries] [Reply To This Message]

Re: The sky is falling! XML's dirty secret! Go back!It's a tr

  • To: xml-dev@l...
  • Subject: Re: The sky is falling! XML's dirty secret! Go back!It's a trap!
  • From: Paul Prescod <paul@p...>
  • Date: Sun, 02 Jun 2002 12:38:23 -0700
  • References: <EDOIJIGA51TRTS8761HFHBVSJFCNMG.3cf6abb5@MChamp>

sky encryption
Mike Champion wrote:
> 
>...
> 
> I don't know much about encryption, but from reading about
> cryptanalysis in WWWII it would appear that having a "crib"
> (a bit of known plaintext) is a useful shortcut to breaking a cipher.
> The tags in an XML message are likely to be known (or easily
> guessable) by an attacker.  So, a straightforward encryption of
> an entire XML message might be considerably less secure than
> an encryption of a non-self-describing message.

But "non-self-describing" is not the same as "unpredictable".
/etc/passwd is not self-describing. (you have to use "man" to figure out
what the columns mean). But it is very predictable. Moreso than XML,
because it has no notion of comments, etc.

But anyhow, if modern cryptography depended on data being unpredictable
we would all be in a lot of trouble. The HTTP traffic going to a
credit-card accepting site is totally predictable. And any consumer can
generate a "sample document". I don't see how network data can be made
unpredictable and yet computer parsable. 

IANACryptanalyst but I know that we are much better at encryption than
we were in WWII. Consider:

"  A standard cryptanalytic attack is to know some plaintext matching a
  given piece of ciphertext and try to determine the key which maps one 
  to the other.  This plaintext can be known because it is standard (a
  standard greeting, a known header or trailer, ...) or because it is
  guessed.  If text is guessed to be in a message, its position is
probably
  not known, but a message is usually short enough that the cryptanalyst
  can assume the known plaintext is in each possible position and do
  attacks for each case in parallel.  In this case, the known plaintext
can
  be something so common that it is almost guaranteed to be in a
message.

  A strong encryption algorithm will be unbreakable not only under known
  plaintext (assuming the enemy knows all the plaintext for a given
  ciphertext) but also under "adaptive chosen plaintext" -- an attack
  making life much easier for the cryptanalyst.  In this attack, the
enemy
  gets to choose what plaintext to use and gets to do this over and
over,
  choosing the plaintext for round N+1 only after analyzing the result
of
  round N.

  For example, as far as we know, DES is reasonably strong even under an
  adaptive chosen plaintext attack (the attack Biham and Shamir used). 
Of
  course, we do not have access to the secrets of government
cryptanalytic
  services.  Still, it is the working assumption that DES is reasonably
  strong under known plaintext and triple-DES is very strong under all
  attacks."

 * http://www.faqs.org/faqs/cryptography-faq/part03/

 Paul Prescod

PURCHASE STYLUS STUDIO ONLINE TODAY!

Purchasing Stylus Studio from our online shop is Easy, Secure and Value Priced!

Buy Stylus Studio Now

Download The World's Best XML IDE!

Accelerate XML development with our award-winning XML IDE - Download a free trial today!

Don't miss another message! Subscribe to this list today.
Email
First Name
Last Name
Company
Subscribe in XML format
RSS 2.0
Atom 0.3
 

Stylus Studio has published XML-DEV in RSS and ATOM formats, enabling users to easily subcribe to the list from their preferred news reader application.


Stylus Studio Sponsored Links are added links designed to provide related and additional information to the visitors of this website. they were not included by the author in the initial post. To view the content without the Sponsor Links please click here.

Site Map | Privacy Policy | Terms of Use | Trademarks
Free Stylus Studio XML Training:
W3C Member
Stylus Studio® and DataDirect XQuery ™are products from DataDirect Technologies, is a registered trademark of Progress Software Corporation, in the U.S. and other countries. © 2004-2013 All Rights Reserved.