![]() ![]() ![]() ![]() These weaknesses leak information that’s exploitable by a malicious party monitoring the communication. Let’s examine the encrypted messages sent from the client to the server and the server back to the client in more detail, looking for weaknesses in each. It simply echoes the message with the addition of two spaces and the phrase “Airplane!” How does it respond?Įnter a message to send to server: Testing.Ĭlient: Decrypted message is "Testing. Let’s pick up there by sending a simple phrase to the server. I wrote a demonstration program that sends encrypted messages between a client and server, with the server knowing how to respond to funny lines from the classic comedy, Airplane! I concluded with a mysterious statement, “There’s a weakness in our simple XOR cipher that’s exposed by sending a message not recognized as a line from Airplane!” In a previous post, Encrypting and Decrypting Text, I discussed how the shared key derived from a Diffie-Hellman Key Exchange can be used with a simple cipher (XOR) to encrypt and decrypt text. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |