A String Based Attack
The difficulty of using the Kasiski examination lies in finding repeated strings. This is a very hard task to perform manually, but computers can make it much easier. However, care is still required, since some repeated strings may just be coincidence, so that some of the repeat distances are misleading. The cryptanalyst has to rule out the coincidences to find the correct length. Then, of course, the monoalphabetic ciphertexts that result must be cryptanalyzed.
- A cryptanalyst looks for repeated groups of letters and counts the number of letters between the beginning of each repeated group. For instance if the ciphertext was FGXTHJAQWNFGXQ, the distance between FGX's is 10. The analyst records the distances for all repeated groups in the text.
- The analyst next factors each of these numbers. If any number is repeated in the majority of these factorings, it is likely to be the length of the keyword. This is because repeated groups are more likely to occur when the same letters are encrypted using the same key letters than by mere coincidence; this is especially true for long matching strings. The key letters are repeated at multiples of the key length, so most of the distances found in step 1 are likely to be multiples of the key length. A common factor is usually evident.
- Once the keyword length is known, the following observation of Babbage and Kasiski comes into play. If the keyword is N letters long, then every Nth letter must have been enciphered using the same letter of the keytext. Grouping every Nth letter together, the analyst has N "messages", each encrypted using a one-alphabet substitution, and each piece can then be attacked using frequency analysis.
- Using the solved message, the analyst can quickly determine what the keyword was. Or, in the process of solving the pieces, the analyst might use guesses about the keyword to assist in breaking the message.
- Once the interceptor knows the keyword, that knowledge can be used to read other messages that use the same key.
Read more about this topic: Kasiski Examination
Famous quotes containing the words string, based and/or attack:
“... looped with the creep of varying light,
Monkey-brown, fish-grey, a string of infected circles
Loitering like bullies, about to coagulate....”
—Philip Larkin (19221986)
“A woman does not have to make decisions based on the need to survive. She can cut through issues, call shots as she sees them.... Many bad decisions are made by men in government because it is good for them personally to make bad public decisions.”
—Dianne Feinstein (b. 1933)
“Philosophy can be compared to some powders that are so corrosive that, after they have eaten away the infected flesh of a wound, they then devour the living flesh, rot the bones, and penetrate to the very marrow. Philosophy at first refutes errors. But if it is not stopped at this point, it goes on to attack truths. And when it is left on its own, it goes so far that it no longer knows where it is and can find no stopping place.”
—Pierre Bayle (16471706)