OBAKE Cryptanalysis: Phonetic Redundancy Attack


In this type of operation the relationship between consonants and vowels (C/VQ) is analyzed aiming to locate phonemes that can identify both the language and the construction and syntax of the original information. It is particularly useful to attack plain-text information or, as a mid layer to conduct other attacks in customized uncompressed file patterns.


It is evident that the distribution of letters, especially the most common in Portuguese and English (in red and yellow) is completely distorted and changed after encryption, preventing any successful attack of this type. Also, a pattern of similarity (1.24 to 1.25) can be seen in all cryptographic results, regardless of the text-plane used.


Therefore, this type of attack on the OBAKE-512 algorithm or the data it encrypts is completely impractical.


If you want details about the program and the files used here, please visit this page.

CSV FILE

Original CSV file
OBAKE CSV file

TXT FILE

Original TXT file
OBAKE TXT file

HTML FILE

Original HTML file
OBAKE HTML file

JSON FILE

Original Json file
OBAKE Json file

Bibliographic references


B. Schneier, "Detecting Words and Phrases in Encrypted VoIP Calls", https://www.schneier.com/blog/archives/2011/03/detecting_words.html

C. G. Mehmet E.Dalkilic, "An Interactive Cryptanalysis Algorithm for the Vigenere Cipher," 15 Dez 2000.

D. Stinson, "Criptography: Theory and Practice", Chapman & Hall/CRC, 2006.

A. Biryukov et al., "Encyclopedia of Cryptography and Security", H. C. v. Tilborg, Ed., SpringerScience+Business Media LLC, 2011.