OBAKE Cryptanalysis: Entropy


Entropy in cryptography is the capacity for randomness in the distribution of information. The higher the entropy, the more effective the encryption, preventing the attacker from being able, through frequency analysis of the letters, to identify patterns that allow the original data to be discovered.


Entropy can be measured using mathematical formulas, Shannon's being the best known - but considered only the bare minimum. We utilized in our tests other algorithms besides Shannon (both for bits and bytes), like Bi-Entropy and Tres-Bi-Entropy.


Below are the entropy results obtained by both OBAKE, AES-CBC, and XSalsa20 on several different files, demonstrating the absolute quality of the OBAKE-512 algorithm to a worldwide accepted denominator.


If you want details about the program and the files used as well as the methodology employed, please visit this page.


The pictures below demonstrate the quality of OBAKE, in comparison with the most in-compliance algorithm (AES).


All sequences show:

  • the ORIGINAL file;
  • the correspondent OBAKE file;
  • the correspondent AES file; and
  • the correspondent XSalsa20 file.

DOCX FILE

Original
OBAKE
AES
XSalsa20

PDF FILE

Original PDF file
OBAKE PDF file
AES PDF file
XSALSA PDF file

XLSX FILE

Original XLSX file
OBAKE XLSX file
AES XLSX file
XSALSA XLSX file

CSV FILE

Original CSV file
OBAKE CSV file
AES CSV file
XSALSA CSV file

TXT FILE

Original TXT file
OBAKE TXT file
AES TXT file
XSALSA TXT file

HTML FILE

Original HTML file
OBAKE HTML file
AES HTML file
XSALSA HTML file

JSON FILE

Original Json file
OBAKE Json file
AES Json file
XSALSA Json file

Bibliographic references


C.E. Shannon, "A Mathematical Theory of Communication", The Bell System Technical Journal Vol 27 Issue 3, 1948, https://doi.org/10.1002/j.1538-7305.1948.tb01338.x

A. Biryukov, Encyclopedia of Cryptography and Security, H. C. v. Tilborg, Ed., SpringerScience+Business Media LLC, 2011.

A. Vassilev, T.A. Hall et al., "The Importance of Entropy to Information Security", IEEE - Computer Vol 47 Issue 2, 2014, https://doi.org/10.1109/MC.2014.47

B. Zolfaghari, K. Bibak, T. Koshiba, "The Odyssey of Entropy: Cryptography", https://doi.org/10.3390/e24020266

C. Ellison, C. Hall, R. Milbert, B. Schneier, "Protecting Secret Keys with Personal Entropy", FGCS Vol 16 issue 4, Elsevier, 2000

S.R.Davies, R.Macfarlane et al., "Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification", Napier University, https://doi.org/10.3390/e24101503.

V.Kumar, V.Pathak et al., "Complex Entropy-based Encryption and Decryption Technique for Securing Medical Images", Springer Nature, https://doi.org/10.1007/s11042-022-13546-z

Y.Dodis, A.Smith, "Entropy Security and the Encryption of High Entropy Messages", Cryptology ePrint Archive, https://eprint.iacr.org/2004/219

Entropy in Computing, https://en.wikipedia.org/wiki/Entropy_(computing)