home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!europa.asd.contel.com!darwin.sura.net!zaphod.mps.ohio-state.edu!moe.ksu.ksu.edu!hobbes.physics.uiowa.edu!news.uiowa.edu!ns-mx!pyrite.cs.uiowa.edu
- From: jones@pyrite.cs.uiowa.edu (Douglas W. Jones,201H MLH,3193350740,3193382879)
- Newsgroups: sci.crypt
- Subject: Re: Padded Data
- Message-ID: <13332@ns-mx.uiowa.edu>
- Date: 31 Jul 92 20:02:38 GMT
- References: <1992Jul31.153719.28374@ncsu.edu>
- Sender: news@ns-mx.uiowa.edu
- Lines: 29
-
- From article <1992Jul31.153719.28374@ncsu.edu>,
- by Webbge@che17.ncsu.EDU (Greg Earl Webb):
- >
- > I've seen some interesting posts here recently, but I have yet to
- > see the topic of padding data with garbage.
-
- In my splay-tree based data compression code (C source available on
- request), , the compressor adds a random prefix to the data when asked
- to encrypt as well as compress.
-
- In this case, encryption is done by adjusting the initial state of the
- adaptive compression and expansion data structures by smashing the text
- of the key through them. I threw in the random padding because so many
- documents tend to start with predictable stuff such as "From:" and I
- figured that even a slight random addition to the source text would
- significantly complicate the effort needed to make a known plaintext
- attack.
-
- In fact, had I thrown in a random byte or two every few tens of
- characters, I'd have done even better because that would significantly
- complicate controlled plaintext attacks, to which I know my splay-tree
- based code is vulnerable (immediately after compressing the sequence
- aaaaaaaa on an 8 bit alphabet, the code a is known, independant of the
- starting state of the model). An occasional random number thrown into
- the stream of compressed data will prevent a longer sequence from
- putting the entire compression data structure into a known state.
-
- Doug Jones
- jones@cs.uiowa.edu
-