Megalextoria
Retro computing and gaming, sci-fi books, tv and movies and other geeky stuff.

Home » Archive » net.micro.apple » Analysis of SAFECOM
Show: Today's Messages :: Show Polls :: Message Navigator
E-mail to friend 
Switch to threaded view of this topic Create a new topic Submit Reply
Analysis of SAFECOM [message #85907] Mon, 17 June 2013 17:18
gwyn@brl-tgr.ARPA (Do is currently offline  gwyn@brl-tgr.ARPA (Do
Messages: 63
Registered: May 2013
Karma: 0
Member
Message-ID: <6710@brl-tgr.ARPA>
Date: Fri, 21-Dec-84 00:00:35 EST
Article-I.D.: brl-tgr.6710
Posted: Fri Dec 21 00:00:35 1984
Date-Received: Sat, 22-Dec-84 02:18:32 EST
Distribution: net
Organization: Ballistic Research Lab
Lines: 31
Xref: watmath net.micro.apple:1543 net.crypt:258

Some time in September, Bill Parker posted the source to SAFECOM,
which is an encryption program for inter-micro communications.
I just now got around to looking into its innards and thought I
would let its potential users know that it is very easy to crack.

The encryption is done basically by adding corresponding letters
of a cyclic key and the plaintext, then splitting the resulting
byte into two 4-bit nybbles and offsetting them into the printable
ASCII range by adding a constant.

The first thing a cryptanalyst would do to crack a message in this
system would be to reconstruct the (key + plaintext) bytes from
the offset 4-bit nybbles; this is a purely mechanical procedure.

The next step would be a Kasiski analysis to determine the key
length.  (This is described in the hardcover edition of Kahn's
"The Codebreakers"; it is simple to perform.)

Then he would stack the ciphertext into "bins", each enciphered
by one of the key letters.  Since each of the stacks is just a
Caesar substitution, a correlation between each stack frequency
distribution and the normal alphabetic frequencies will show what
the key letter is for that stack.

Then, since the key is now known, the entire message can be quickly
decrypted using SAFECOM!

I estimate that it would take someone with appropriate computer
tools only a couple of minutes to crack a SAFECOM-encrypted message.
This assumes a moderately long message and a relatively short key;
if the ratio is not as favorable it would take somewhat longer.
  Switch to threaded view of this topic Create a new topic Submit Reply
Previous Topic: Hard disk for $695.00? (SUMMARY OF RESPONSES)
Next Topic: * FOR SALE *
Goto Forum:
  

-=] Back to Top [=-
[ Syndicate this forum (XML) ] [ RSS ] [ PDF ]

Current Time: Wed Apr 24 23:30:12 EDT 2024

Total time taken to generate the page: 0.04081 seconds