RoboScape (2024)

Learning Goals

  • Brute-force attack exposing the weaknesses of basic encryption
  • Importance of the strength of a cipher's algorithm and the secret key

Description

Being a rudimentary cipher, Caesar cipher is easily susceptible to a host of attacks. The Caesar cipher has a very small key space, as there are only so many single shift values that can be chosen even moving into ASCII characters. Therefore, it is trivial for a computer program (or even humans) to explore the key space and find out the encryption key.

In this unit, we demonstrate Caesar cipher's weaknesses and provide solutions.

Glossary

Required/Authorized Commands

  • listen
  • set key
  • encrypt
  • decrypt
  • encrypt++
  • speck encrypt

Activities

  • Discussing Key Cracking
    • Frequency Analysis: in a longer message especially, by examining how often letters come up in the encrypted text and comparing it to the data of percent likelihood for a particular letter to be used in English words, we can make educated guesses on decryption. This can be assisted by examining either spaces between words that have been encrypted or, if you can still see the spaces as plain text, by considering the length of common words for the particular application ("set" and "speed" in particular for the robots).

    • Brute Force: alternatively, we can just go through all possible key values looking for a decrypted text that is what we'd expect to see (such as "set speed")

    • Character Encoding: utilizes the ASCII table

  • Brute Force in Action
    • By this point, students might have already discovered that given the limited set of shift values in the ASCII implementation of the cipher, they can break each other's encryption by brute-forcing the key.

    • One option is a partially known plain-text attack
      1. Capture the encrypted command
      2. Cycle through all the shift values until you get a sensible text
      3. Use that value to encrypt messages and attack the robot
    • The other option is to encrypt your command with different shift values and query the server until a true acknowledgment is received from the server. This would mean that the key had been discovered.

  • Mitigation Strategies
    • There are different strategies to protect against brute force attacks to a good extent.
      • Increased key space by using encrypt++ and multiple keys at once
      • Reducing the key lifetime by changing it automatically and frequently during operation
      • Basically, any other improvements to the cipher used and quality of encryption
  • Example: Shift Array
    • A simple way of enforcing the Caesar cipher that we have is to modify it to use a list of shift values. Instead of shifting all the characters by a constant shift value, we will loop through a series of shift values and shift each character differently, making the search space for a brute force attack much bigger. The longer the list of shift values, the harder it would be to crack. Incorporating this technique means that a dumb brute-force attack in NetsBlox would take long enough to make it infeasible.

Next Steps

Back

RoboScape (2024)
Top Articles
Tether Stability Made It the Safest Stablecoin Bet Amid U.S. Banking Crisis, Analysts Say
Mobile phone porting
SZA: Weinen und töten und alles dazwischen
Po Box 7250 Sioux Falls Sd
Tesla Supercharger La Crosse Photos
Big Spring Skip The Games
Klustron 9
The Idol - watch tv show streaming online
Bank Of America Appointments Near Me
Fallout 4 Pipboy Upgrades
Autozone Locations Near Me
123 Movies Babylon
ATV Blue Book - Values & Used Prices
Local Dog Boarding Kennels Near Me
Local Collector Buying Old Motorcycles Z1 KZ900 KZ 900 KZ1000 Kawasaki - wanted - by dealer - sale - craigslist
Bad Moms 123Movies
Buff Cookie Only Fans
Sam's Club La Habra Gas Prices
Honda cb750 cbx z1 Kawasaki kz900 h2 kz 900 Harley Davidson BMW Indian - wanted - by dealer - sale - craigslist
Azpeople View Paycheck/W2
Understanding Genetics
Cvs El Salido
[PDF] NAVY RESERVE PERSONNEL MANUAL - Free Download PDF
At 25 Years, Understanding The Longevity Of Craigslist
Enduring Word John 15
Mini-Mental State Examination (MMSE) – Strokengine
Uky Linkblue Login
Transformers Movie Wiki
Devotion Showtimes Near The Grand 16 - Pier Park
Math Minor Umn
Renfield Showtimes Near Marquee Cinemas - Wakefield 12
Quality Tire Denver City Texas
Envy Nails Snoqualmie
Samsung 9C8
Asian Grocery Williamsburg Va
Lyca Shop Near Me
Boone County Sheriff 700 Report
Dispensaries Open On Christmas 2022
Seminary.churchofjesuschrist.org
How to Quickly Detect GI Stasis in Rabbits (and what to do about it) | The Bunny Lady
Who Is Responsible for Writing Obituaries After Death? | Pottstown Funeral Home & Crematory
What to Do at The 2024 Charlotte International Arts Festival | Queen City Nerve
Rs3 Nature Spirit Quick Guide
Craigslist Rooms For Rent In San Fernando Valley
Brauche Hilfe bei AzBilliards - Billard-Aktuell.de
Ronnie Mcnu*t Uncensored
Lightfoot 247
O'reilly's Eastman Georgia
The Ultimate Guide To 5 Movierulz. Com: Exploring The World Of Online Movies
Obituaries in Westchester, NY | The Journal News
Bellin Employee Portal
Latest Posts
Article information

Author: Dean Jakubowski Ret

Last Updated:

Views: 5709

Rating: 5 / 5 (50 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Dean Jakubowski Ret

Birthday: 1996-05-10

Address: Apt. 425 4346 Santiago Islands, Shariside, AK 38830-1874

Phone: +96313309894162

Job: Legacy Sales Designer

Hobby: Baseball, Wood carving, Candle making, Jigsaw puzzles, Lacemaking, Parkour, Drawing

Introduction: My name is Dean Jakubowski Ret, I am a enthusiastic, friendly, homely, handsome, zealous, brainy, elegant person who loves writing and wants to share my knowledge and understanding with you.