[JoGu]

Cryptology

1.1 General Discussion of Bitstream Ciphers

a7Hzq .#5r<
kÜ\as TâÆK$
ûj(Ö2 ñw%h:
Úk{4R f~`z8
¤˜Æ+Ô „&¢Dø

XOR

As a first example of a bitstream cipher we encountered XOR in Part I of these lectures. In the twenties of the 20th century XOR ciphers were invented to encrypt teleprinter messages. These messages were written on five-hole punched tapes:

[Punched tape]

each column representing a five-bit-block. Another punched tape provided the key stream. VERNAM filed this procedure as a U. S. patent in 1918. He used a key tape whose ends were glued together, resulting in a periodic key stream. MAUBORGNE immediately recognized that a nonperiodic key is obligatory for security.

In its strongest form, the one-time pad, XOR encryption is an example of perfect security in the sense of SHANNON. As algorithm A5 or E0 XOR helps to secure mobile phones or the Bluetooth protocol for wireless data transmission. As RC4 it is part of the TLS/SSL protocol that (often) encrypts client-server communication in the World Wide Web, and of the PKZIP compression software. There are many other current applications, not all of them satisfying the expected security requirements.

The scope of XOR encryption ranges from simple ciphers that are trivially broken to unbreakable ciphers.

Advantages of XOR Ciphers

Pitfalls

A remark on the first item, the vulnerability for attacks with known plaintext: The common ISO character set for texts has a systematic weakness. The 8-bit codes of the lower-case letters a..z all start with 011, of the upper-case letters A..Z, with 010. A supposed sequence of six lower-case letters (no matter which) reveals 6*3 = 18 key bits.

[By the way the appearance of many zeroes in the leading bits of the bytes is an important identifying feature of texts in many European languages.]

In other words: We cannot prevent the attacker from getting or guessing a good portion of the plaintext. Thus the security against an attack with known plaintext is a fundamental requirement for an XOR cipher, even more than for any other cryptographic procedure.

Cryptographic Security of Random Generators

This being said the crucial question for a pseudorandom sequence, or for the pseudorandom generator producing it, is:

Is it possible to determine some more bits from a (maybe fragmented) chunk of the sequence?

The answer for the »classic« pseudorandom generators used in statistical applications or simulations will be YES. But we'll also learn about pseudorandom generators that—supposedly—are cryptographically secure in this sense.


Author: Klaus Pommerening, 2000-Nov-28; last change: 2021-Apr-12.