In this type of attack, it is verified the occurrence of repetition patterns of letters, which can identify the language and thus proceed to the identification of articles, prepositions, words, verbs (see references at the end of the page).
The attack was performed on files in "Plain TEXT" format (understandable by simple reading) and their respective encrypted files, where we can therefore compare the results in search of the fully known patterns of various languages.
As can be clearly seen, the expected patterns are not generated in the cryptographic result, and because the OBAKE-512 algorithm generates a high entropy rate, this kind of attack is impractical.
If you want details about the program and the files used here, please visit this page.
C. G. Mehmet E.Dalkilic, "An Interactive Cryptanalysis Algorithm for the Vigenere Cipher," 15 Dez 2000.
D. Stinson, Criptography: Theory and Practice, Chapman & Hall/CRC, 2006.
A. Biryukov, Encyclopedia of Cryptography and Security, H. C. v. Tilborg, Ed., SpringerScience+Business Media LLC, 2011.