Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Traditional encryption is weak and no longer be used. They can be easily broken

ID: 651854 • Letter: T

Question

Traditional encryption is weak and no longer be used. They can be easily broken by using frequency analysis is a well-known fact.

But, the frequency analysis often depends on the number of captured ciphertext, or the duplication of the text. What if the text was compressed by some types of algorithms (such as Huffman algorithm?zlib or lzma) before using traditional encrption? For better security, magic-number-like header or identifier is not added to the text.

How much difficulty increases for frequency analysis attack?

Explanation / Answer

Im no crypto expert, so I cannot answer the full of your question-- but this part is not correct. Encryption using algorithms such as 3DES, RC4, AES, etc is secure to the point where it is not possible to determine from looking at a block of data whether it is random or encrypted. Further, if properly designed there will be an avalanche effect: a very minor change in key or plaintext will have a drastic effect on the encrypted text.

If an algorithm's output is attackable by frequency analysis, it is not suitable for production. I will note that there are some historical computer crypto algorithms (such as AES ECB) which HAVE been susceptible to frequency analysis; and when they are, they are marked as "not safe" and they fall out of use.

Regarding compression, if changing the plaintext increases the difficulty of cracking your encryption, then your algorithm is not secure. I will leave explanations for why that is to others with more knowledge on the topic.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote