Security Basics mailing list archives

Re: Recognizing Encryption Type


From: "Vladimir B. Kropotov" <slyman2000 () Mail ru>
Date: Fri, 3 Feb 2006 10:42:32 +0300

Hi Folks

mam> I was just wondering if there was a feasible way in order to obtain the
mam> encryption type of a specific file. Could this be done using a third
mam> party program that would inspect the running process of the encryptor as
mam> it is working on the input file and after that examining the resulting
mam> output? If not using this procedure, would the attacker be able to
mam> identify the encryption type by reverse engineering the encryptor program?

Basically strong cryptography protocols secutity MUSTN'T change if
protocol is known for attacker. All strong cryptography protocols
consider that encryption method is known.

Another poing of view: if you use system that not suited for security
level (e.g. B2) you mustn't care about attacker which "able to identify
the encryption type", becuase your WHOLE system is strong as your
weaknest link. If  atackers program would inspect the running process of the encryptor as
it is working on the input file - you SHOULDN'T care about encryption
type, you screwed up and loose all your sensitive information.

Direct Answer.
It's possible, especially if you can control input and output.
For more information ask Russian and US experts www.fsb.ru and
www.cia.gov :-D



Regards
Vladimir B.Kropotov


---------------------------------------------------------------------------
EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE
The Norwich University program offers unparalleled Infosec management 
education and the case study affords you unmatched consulting experience. 
Tailor your education to your own professional goals with degree 
customizations including Emergency Management, Business Continuity Planning, 
Computer Emergency Response Teams, and Digital Investigations. 

http://www.msia.norwich.edu/secfocus
---------------------------------------------------------------------------


Current thread: