Every modern
cipher attempts to provide protection against ciphertext-only attacks. The vetting process for a new cipher design standard usually takes many years and includes exhaustive testing of large quantities of ciphertext for any statistical departure from random noise.
See: Advanced Encryption Standard process. Also, the field of
steganography evolved, in part, to develop methods like
mimic functions that allow one piece of data to adopt the statistical profile of another. Nonetheless, poor cipher usage or reliance on home-grown proprietary algorithms that have not been subject to thorough scrutiny has resulted in many computer-age encryption systems that are still subject to ciphertext-only attack. Examples include:
Examples • Early versions of
Microsoft's
PPTP virtual private network software used the same
RC4 key for the sender and the receiver (later versions had other problems). In any case where a stream cipher like RC4 is used twice with the same key, it is open to ciphertext-only attack.
See: stream cipher attack •
Wired Equivalent Privacy (WEP), the first security protocol for
Wi-Fi, proved vulnerable to several attacks, most of them ciphertext-only. • GSM's
A5/1 and
A5/2 • Some modern cipher designs have later been shown to be vulnerable to ciphertext-only attacks. For example,
Akelarre. • A cipher whose key space is too small is subject to
brute force attack with access to nothing but ciphertext by simply trying all possible keys. All that is needed is some way to distinguish valid plaintext from random noise, which is easily done for natural languages when the ciphertext is longer than the
unicity distance. One example is
DES, which only has 56-bit keys. All too common current examples are commercial security products that derive keys for otherwise impregnable ciphers like
AES from a user-selected
password. Since users rarely employ passwords with anything close to the
entropy of the cipher's key space, such systems are often quite easy to break in practice using only ciphertext. The 40-bit
CSS cipher used to encrypt
DVD video discs can always be broken with this method, as all that is needed is to look for
MPEG-2 video data. ==References==