A Natural Language Approach to Automated Cryptanalysis of ...
Transcript of A Natural Language Approach to Automated Cryptanalysis of ...
![Page 1: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/1.jpg)
A Natural Language Approach to Automated Cryptanalysis of Two-time Pads
Joshua MasonKathryn Watkins
Jason EisnerAdam Stubblefield
![Page 2: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/2.jpg)
The Two Time Pad Problem
![Page 3: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/3.jpg)
⊕Attack at Dawn doQvYcSWIPyXaC
![Page 4: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/4.jpg)
Take the Beach ⊕ doQvYcSWIPyXaC
⊕Attack at Dawn doQvYcSWIPyXaC
![Page 5: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/5.jpg)
⊕ Take the Beach ⊕ doQvYcSWIPyXaC
⊕Attack at Dawn doQvYcSWIPyXaC
![Page 6: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/6.jpg)
⊕
Take the Beach
Attack at Dawn
⊕
doQvYcSWIPyXaC
doQvYcSWIPyXaC
⊕⊕
Take the Beach ⊕ doQvYcSWIPyXaC
⊕Attack at Dawn doQvYcSWIPyXaC
![Page 7: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/7.jpg)
⊕
Take the Beach
Attack at Dawn
⊕
doQvYcSWIPyXaC
doQvYcSWIPyXaC
⊕⊕
Take the Beach ⊕ doQvYcSWIPyXaC
⊕Attack at Dawn doQvYcSWIPyXaC
![Page 8: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/8.jpg)
⊕
Take the Beach
Attack at Dawn
⊕
Take the Beach ⊕ doQvYcSWIPyXaC
⊕Attack at Dawn doQvYcSWIPyXaC
![Page 9: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/9.jpg)
Take the Beach
Attack at Dawn
⊕ 15 15 1f 04 43 1f 48 04 54 62 21 00 14 6=
![Page 10: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/10.jpg)
![Page 11: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/11.jpg)
![Page 12: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/12.jpg)
![Page 13: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/13.jpg)
![Page 14: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/14.jpg)
OJNcDfoMncXzYwwQQZRXYWORT190LP
![Page 15: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/15.jpg)
OJNcDfoMncXzYwwQQZRXYWORT190LP
the⊕
![Page 16: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/16.jpg)
QpL
OJNcDfoMncXzYwwQQZRXYWORT190LP
the⊕
![Page 17: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/17.jpg)
OJNcDfoMncXzYwwQQZRXYWORT190LP
the⊕
![Page 18: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/18.jpg)
the⊕
Man
OJNcDfoMncXzYwwQQZRXYWORT190LP
![Page 19: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/19.jpg)
Formalized by F. Rubin in 1978
Automated by E. Dawson and L. Nielson in 1996
![Page 20: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/20.jpg)
Assumptions
• Uppercase English characters and space
• Space is always the most frequent character
![Page 21: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/21.jpg)
P0 ⊕ P1 = 6e 71 00 6f 79 61
![Page 22: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/22.jpg)
P0 ⊕ P1 = 6e 71 00 6f 79 61
![Page 23: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/23.jpg)
P0 ⊕ P1 = 6e 71 6f 79 61
![Page 24: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/24.jpg)
P0 ⊕ P1 = 6e 71 6f 79 61
![Page 25: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/25.jpg)
P1 ⊕ P2 = 67 82 00 00 00 00 00 34
![Page 26: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/26.jpg)
P1 ⊕ P2 = 67 82 00 00 00 00 00 34
![Page 27: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/27.jpg)
P1 ⊕ P2 = 67 82 00 00 00 34
![Page 28: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/28.jpg)
Testing Methodology
• Trained on the first 600K characters of the Bible
• Attempted recovery of passages from first 600K characters of the bible
![Page 29: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/29.jpg)
P0 ⊕ P1 62.7%
P1 ⊕ P2 61.5%
P0 ⊕ P1 62.6%
Percentage Correctly Recovered
Dawson &Nielson
![Page 30: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/30.jpg)
P0 ⊕ P1 62.7% 100%
P1 ⊕ P2 61.5% 99.99%
P0 ⊕ P1 62.6% 99.96%
Percentage Correctly Recovered
Dawson &Nielson
OurTechnique
![Page 31: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/31.jpg)
Our Assumptions
• Plaintext has some structure
• Plaintext is in a language we know
![Page 32: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/32.jpg)
n-gram count2
a 2p 2l 1e 2
![Page 33: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/33.jpg)
![Page 34: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/34.jpg)
7 billioncharacters
![Page 35: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/35.jpg)
450 millioncharacters
7 billioncharacters
![Page 36: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/36.jpg)
4 billion characters
450 millioncharacters
7 billioncharacters
![Page 37: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/37.jpg)
appleorange
![Page 38: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/38.jpg)
start
a
o
P0 ⊕ P1 0e 02 11 02
![Page 39: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/39.jpg)
start
a o
o
p(a) p(o)
P0 ⊕ P1 0e 02 11 02
![Page 40: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/40.jpg)
start
a o
o a
p(a) p(o)
p(o) p(a)
P0 ⊕ P1 0e 02 11 02
![Page 41: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/41.jpg)
start
a o
o a
ap or
or ap
p(p|a) p(r|o)
p(r|o) p(p|a)
p(a) p(o)
p(o) p(a)
P0 ⊕ P1 0e 02 11 02
![Page 42: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/42.jpg)
start
a o
o a
ap or
or ap
app ora
ora app
p(a) p(o)
p(o) p(a)
p(p|a) p(r|o)
p(r|o) p(p|a)
p(p|ap) p(a|or)
p(a|or) p(p|ap)
P0 ⊕ P1 0e 02 11 02
![Page 43: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/43.jpg)
start
a o
o a
ap or
or ap
p(p|a) p(r|o)
p(r|o) p(p|a)
p(a) p(o)
p(o) p(a)
P0 ⊕ P1 0e 02 0e 02
![Page 44: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/44.jpg)
start
a o
o a
ap or
or ap
apa oro
oro apa
p(p|a) p(r|o)
p(r|o) p(p|a)
p(a) p(o)
p(o) p(a)
p(a|ap) p(o|or)
p(o|or) p(a|ap)
P0 ⊕ P1 0e 02 0e 02
![Page 45: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/45.jpg)
start
a o
o a
ap or
or ap
apa oro
oro apa
p(a|ap) p(o|or)
p(o|or) p(a|ap)
p(p|a) p(r|o)
p(r|o) p(p|a)
p(a) p(o)
p(o) p(a)
P0 ⊕ P1 0e 02 0e 02
![Page 46: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/46.jpg)
Memory/Computation
![Page 47: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/47.jpg)
start
a
b
c
P2 ⊕ P3 01 00 02 02
![Page 48: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/48.jpg)
start b c
c
P2 ⊕ P3 01 00 02 02
![Page 49: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/49.jpg)
start b c
c b
P2 ⊕ P3 01 00 02 02
![Page 50: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/50.jpg)
start b c
c b
ba ca
bb cb
bc cc
ca ba
cb bb
cc bc
P2 ⊕ P3 01 00 02 02
![Page 51: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/51.jpg)
start b c
c b
p(b) p(c)
p(c) p(b) P2 ⊕ P3 01 00 02 02
![Page 52: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/52.jpg)
b c
c b
p(b) p(c)
p(c) p(b) P2 ⊕ P3 01 00 02 02
![Page 53: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/53.jpg)
p(b) p(c)
p(c) p(b)
ba ca
bb cb
bc cc
ca ba
cb bb
cc bc
b c
c b
P2 ⊕ P3 01 00 02 02
![Page 54: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/54.jpg)
p(b) p(c)
p(c) p(b)
ba ca
bb cb
bc cc
ca ba
cb bb
cc bc
b c
c b
p(a|b) p(a|c)
p(b|b) p(b|c)
p(c|b) p(c|c)
p(a|c) p(a|b)
p(b|c) p(b|b)
p(c|c) p(c|b)
P2 ⊕ P3 01 00 02 02
![Page 55: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/55.jpg)
ba ca
bb cb
bc cc
ca ba
cb bb
cc bc
p(a|b) p(a|c)
p(b|b) p(b|c)
p(c|b) p(c|c)
p(a|c) p(a|b)
p(b|c) p(b|b)
p(c|c) p(c|b)
P2 ⊕ P3 01 00 02 02
![Page 56: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/56.jpg)
ba ca
bb cb
bc cc
ca ba
cb bb
cc bc
P2 ⊕ P3 01 00 02 02
![Page 57: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/57.jpg)
ba ca
ca ba
cc bc
P2 ⊕ P3 01 00 02 02
![Page 58: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/58.jpg)
ba ca
ca ba
cc bc
...
P2 ⊕ P3 01 00 02 02
![Page 59: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/59.jpg)
...
P2 ⊕ P3 01 00 02 02
![Page 60: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/60.jpg)
... END
P2 ⊕ P3 01 00 02 02
![Page 61: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/61.jpg)
END
P2 ⊕ P3 01 00 02 02
![Page 62: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/62.jpg)
ba ca ... ENDb c
P2 ⊕ P3 01 00 02 02
![Page 63: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/63.jpg)
Commodity Hardware
System Dual CorePentium 3 GHz
Memory 8 GB
Storage 1.2 TB
![Page 64: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/64.jpg)
Model Build Time ~12 hours
Runtime 200 ms per byte
Memory Usage ~2 GB
![Page 65: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/65.jpg)
Our testing methodology
![Page 66: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/66.jpg)
402,590 Files 98,699 Files 520,931 Files
![Page 67: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/67.jpg)
402,590 Files 98,699 Files 520,931 Files
2,590 Files 8,699 Files 20,931 Files
![Page 68: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/68.jpg)
402,590 Files 98,699 Files 520,931 Files
2,590 Files 8,699 Files 20,931 Files
50 Files 50 Files 50 Files
![Page 69: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/69.jpg)
Small
HTML 90.64%
E-mail 82.29%
Documents 53.84%
![Page 70: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/70.jpg)
Small Medium
HTML 90.64% 92.78%
E-mail 82.29% 89.04%
Documents 53.84% 53.05%
![Page 71: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/71.jpg)
Small Medium Large
HTML 90.64% 92.78% 93.79%
E-mail 82.29% 89.04% 90.85%
Documents 53.84% 53.05% 52.72%
![Page 72: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/72.jpg)
The Switching Problem
![Page 73: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/73.jpg)
I want to remind you about our All-Employee Meeting this Tuesday, Oct. 23, at 10 a.m. Houston time at the Hyatt Regency. We obviously have a lot to talk about. Last week
Well I hope you have Dad doing some of the cleaning! You know how he always has an opinion but yet no participation. Anyway I hope you're doing fine. I'm fine
![Page 74: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/74.jpg)
I want to remind you about our All-Employee Meeting this Tuesday, Oct. 23, at 10 a.m. Houston time at the Hyatt Regency participation. Anyway I hope you're doing fine. I'm fine and about to
Well I hope you have Dad doing some of the cleaning! You know how he always has an opinion but yet no. We obviously have a lot to talk about. Last week we reported third quarter earnings. We
![Page 75: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/75.jpg)
Wu showed Word 2002 re-uses one time pad
![Page 76: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/76.jpg)
T13/1510D revision 1
Working
T13
Draft
1510D
Revision 1.0
January 17, 2003
ATA/ATAPI Host Adapters Standard (ATA – Adapter)
This is an internal working document of T13, a Technical Committee of Accredited Standards Committee
INCITS. The T13 Technical Committee may modify the contents. This document is made available for review
and comment only.
Permission is granted to members of INCITS, its technical committees, and their associated task groups to
reproduce this document for the purposes of INCITS standardization activities without further permission,
provided this notice is included. All other rights are reserved. Any commercial or for-profit replication or
republication is prohibited.
T13 Technical Editor:
Tony Goodfellow
Pacific Digital Corporation
2052 Alton Parkway
Irvine, CA92602
USA
Tel: 949-252-1111
Fax: 949-252-9397
Email: [email protected]
Working
T13
Draft
1532D Volume 1
Revision 2 18 February 2003
Information Technology - AT Attachment with Packet Interface – 7
Volume 1 (ATA/ATAPI-7 V1) This is an internal working document of T13, a Technical Committee of Accredited Standards Committee
INCITS. As such, this is not a completed standard and has not been approved. The contents may be modified
by the T13 Technical Committee. This document is made available for review and comment only.
Permission is granted to members of INCITS, its technical committees, and their associated task groups to
reproduce this document for the purposes of INCITS standardization activities without further permission,
provided this notice is included. All other rights are reserved. Any commercial or for-profit replication or
republication is prohibited.
T13 Technical Editor:
Peter T. McLean Maxtor Corporation 2190 Miller Drive Longmont, CO 80501-6744
USA Tel: 303-678-2149 Fax: 303-682-4811 Email: [email protected]
Reference number ANSI INCITS.*** - xxxx
Printed October, 17, 2006 12:56PM
![Page 77: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/77.jpg)
Working
T13
Draft
1532D Volume 1
Revision 2 18 February 2003
Information Technology - AT Attachment with Packet Interface – 7
Volume 1 (ATA/ATAPI-7 V1) This is an internal working document of T13, a Technical Committee of Accredited Standards Committee
INCITS. As such, this is not a completed standard and has not been approved. The contents may be modified
by the T13 Technical Committee. This document is made available for review and comment only.
Permission is granted to members of INCITS, its technical committees, and their associated task groups to
reproduce this document for the purposes of INCITS standardization activities without further permission,
provided this notice is included. All other rights are reserved. Any commercial or for-profit replication or
republication is prohibited.
T13 Technical Editor:
Peter T. McLean Maxtor Corporation 2190 Miller Drive Longmont, CO 80501-6744
USA Tel: 303-678-2149 Fax: 303-682-4811 Email: [email protected]
Reference number ANSI INCITS.*** - xxxx
Printed October, 17, 2006 12:56PM
T13/1510D revision 1
Working
T13
Draft
1510D
Revision 1.0
January 17, 2003
ATA/ATAPI Host Adapters Standard (ATA – Adapter)
This is an internal working document of T13, a Technical Committee of Accredited Standards Committee
INCITS. The T13 Technical Committee may modify the contents. This document is made available for review
and comment only.
Permission is granted to members of INCITS, its technical committees, and their associated task groups to
reproduce this document for the purposes of INCITS standardization activities without further permission,
provided this notice is included. All other rights are reserved. Any commercial or for-profit replication or
republication is prohibited.
T13 Technical Editor:
Tony Goodfellow
Pacific Digital Corporation
2052 Alton Parkway
Irvine, CA92602
USA
Tel: 949-252-1111
Fax: 949-252-9397
Email: [email protected]
Revision 1January 17, 2003
![Page 78: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/78.jpg)
T13/1510D revision 1
Working
T13
Draft
1510D
Revision 1.0
January 17, 2003
ATA/ATAPI Host Adapters Standard (ATA – Adapter)
This is an internal working document of T13, a Technical Committee of Accredited Standards Committee
INCITS. The T13 Technical Committee may modify the contents. This document is made available for review
and comment only.
Permission is granted to members of INCITS, its technical committees, and their associated task groups to
reproduce this document for the purposes of INCITS standardization activities without further permission,
provided this notice is included. All other rights are reserved. Any commercial or for-profit replication or
republication is prohibited.
T13 Technical Editor:
Tony Goodfellow
Pacific Digital Corporation
2052 Alton Parkway
Irvine, CA92602
USA
Tel: 949-252-1111
Fax: 949-252-9397
Email: [email protected]
Working
T13
Draft
1532D Volume 1
Revision 2 18 February 2003
Information Technology - AT Attachment with Packet Interface – 7
Volume 1 (ATA/ATAPI-7 V1) This is an internal working document of T13, a Technical Committee of Accredited Standards Committee
INCITS. As such, this is not a completed standard and has not been approved. The contents may be modified
by the T13 Technical Committee. This document is made available for review and comment only.
Permission is granted to members of INCITS, its technical committees, and their associated task groups to
reproduce this document for the purposes of INCITS standardization activities without further permission,
provided this notice is included. All other rights are reserved. Any commercial or for-profit replication or
republication is prohibited.
T13 Technical Editor:
Peter T. McLean Maxtor Corporation 2190 Miller Drive Longmont, CO 80501-6744
USA Tel: 303-678-2149 Fax: 303-682-4811 Email: [email protected]
Reference number ANSI INCITS.*** - xxxx
Printed October, 17, 2006 12:56PM
Revision 218 February 2003
![Page 79: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/79.jpg)
• November 13, 2002 ATA/ATAPI Host Adapters Standard (ATA Adapter) This is an internal working document of T13, a Technical Committee of Accredited Standards Committee INCITS. The T13 Technical Committee may modify the contents. This document is made available for review and comment only. Permission is granted to members of INCITS, its technical committees, and their associated task groups to reproduce
![Page 80: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/80.jpg)
• November 13, 2002 ATA/ATAPI Host Adapters Standard (ATF; h Packet) This is no internal working document of T13, a Technical Committee of Accredited Standards Committee INCITS. The T13 Technical Committee may modify the contents. This document is made available and has not been approved. The contents may be modified by the T13 Technical technical committees, and their associated task groups to reproduce
![Page 81: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/81.jpg)
• November 13, 2002 ATA/ATAPI Host Adapters Standard (ATF; h Packet) This is no internal working document of T13, a Technical Committee of Accredited Standards Committee INCITS. The T13 Technical Committee may modify the contents. This document is made available and has not been approved. The contents may be modified by the T13 Technical technical committees, and their associated task groups to reproduce
![Page 82: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/82.jpg)
Exact Pairwise
HTML 93.79% 99.45%
E-mail 90.85% 98.41%
Documents 52.72% 75.91%
![Page 83: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/83.jpg)
Take the Beach ⊕ doQvYcSWIPyXaC
⊕Attack at Dawn doQvYcSWIPyXaC
![Page 84: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/84.jpg)
Take the Beach ⊕ doQvYcSWIPyXaC
⊕Attack at Dawn doQvYcSWIPyXaC
Bring me Cakes ⊕ doQvYcSWIPyXaC
![Page 85: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/85.jpg)
Take the Beach ⊕ doQvYcSWIPyXaC
⊕Attack at Dawn doQvYcSWIPyXaC
⊕
Take the Beach
Attack at Dawn
⊕
![Page 86: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/86.jpg)
⊕Attack at Dawn doQvYcSWIPyXaC
⊕
Attack at Dawn
⊕
Bring me Cakes
Bring me Cakes ⊕ doQvYcSWIPyXaC
![Page 87: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/87.jpg)
Take the Beach ⊕ doQvYcSWIPyXaC
⊕
Take the Beach
⊕Bring me Cakes
Bring me Cakes ⊕ doQvYcSWIPyXaC
![Page 88: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/88.jpg)
⊕ ⊕
⊕
Attack at Dawn
Take the Beach
Take the Beach
Attack at Dawn
Bring me Cakes
Bring me Cakes
![Page 89: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/89.jpg)
⊕
Attack at Dawn
Take the Beach
![Page 90: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/90.jpg)
⊕
Attack at Dawn
Take the Beach
A
T
![Page 91: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/91.jpg)
⊕
Take the Beach
Bring me Cakes
⊕
Attack at Dawn
Take the Beach
A
T
T
B
![Page 92: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/92.jpg)
Small
HTML 99.96%
E-mail 98.24%
Documents 69.92%
![Page 93: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/93.jpg)
Small Medium
HTML 99.96% 99.95%
E-mail 98.24% 98.33%
Documents 69.92% 71.11%
![Page 94: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/94.jpg)
Small Medium Large
HTML 99.96% 99.95% 99.95%
E-mail 98.24% 98.33% 98.34%
Documents 69.92% 71.11% 69.39%
![Page 95: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/95.jpg)
⊕
![Page 96: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/96.jpg)
Large
HTML 93.79%
E-mail ⊕ HTML 96.60%
E-mail 90.85%
![Page 97: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/97.jpg)
Able to recover plaintext with over 99% accuracy
Conclusions
![Page 98: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/98.jpg)
Able to recover plaintext with over 99% accuracy
Technique works on different document types
Conclusions
![Page 99: A Natural Language Approach to Automated Cryptanalysis of ...](https://reader033.fdocuments.in/reader033/viewer/2022050218/626e8569a31e8a512c4cf1e8/html5/thumbnails/99.jpg)
Able to recover plaintext with over 99% accuracy
Technique works on different document types
Keystream reuse is a real problem
Conclusions