Skip to content

Commit 091cd23

Browse files
committed
Add a reference to HTTP traffic analysis
1 parent 990147c commit 091cd23

File tree

1 file changed

+8
-0
lines changed

1 file changed

+8
-0
lines changed

trainingportal/static/lessons/cryptoBreaker/crypto_xor.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,14 @@ If the attacker controls the input, they may easily derive the key by feeding th
3939

4040
Even if the attacker doesn't control the input, if they can guess one message and have the cipher for that message, then they will be able to obtain the key and decrypt all subsequent messages.
4141

42+
For example if XOR was used for encrypting HTTP traffic, the first line of an HTTP request to a website will most likely be:
43+
44+
GET / HTTP/2
45+
46+
Similarly the first line of the HTTP response will be:
47+
48+
HTTP 200 OK
49+
4250
The algorithm is also succeptible to frequency analysis as similar blocks will look the same encrypted.
4351

4452
Finally if the key is poorly chosen, as in the example above, the key can be brute forced: meaning the attacker will try all possible key combinations. In the case of a key size of 1 byte, there are 256 combinations.

0 commit comments

Comments
 (0)