OBAKE Cryptanalysis: Frequency Analysis


In this type of attack, it is verified the occurrence of repetition patterns of letters, which can identify the language and thus proceed to the identification of articles, prepositions, words, verbs (see references at the end of the page).


The attack was performed on files in "Plain TEXT" format (understandable by simple reading) and their respective encrypted files, where we can therefore compare the results in search of the fully known patterns of various languages.


As can be clearly seen, the expected patterns are not generated in the cryptographic result, and because the OBAKE-512 algorithm generates a high entropy rate, this kind of attack is impractical.


If you want details about the program and the files used here, please visit this page.

CSV FILE

Original CSV file
OBAKE CSV file

TXT FILE

Original TXT file
OBAKE TXT file

HTML FILE

Original HTML file
OBAKE HTML file

JSON FILE

Original Json file
OBAKE Json file

Bibliographic references


C. G. Mehmet E.Dalkilic, "An Interactive Cryptanalysis Algorithm for the Vigenere Cipher," 15 Dez 2000.

D. Stinson, Criptography: Theory and Practice, Chapman & Hall/CRC, 2006.

A. Biryukov, Encyclopedia of Cryptography and Security, H. C. v. Tilborg, Ed., SpringerScience+Business Media LLC, 2011.