Jump to content

Plaintext: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
mNo edit summary
IXNL-UUCP (talk | contribs)
Vandalism - Undid revision 1225041767 by 156.194.59.18 (talk)
 
(240 intermediate revisions by more than 100 users not shown)
Line 1: Line 1:
{{Short description|Unencrypted information}}
''The "[[plain text]]" term has a different meaning.''
{{About|cryptography|the computing term meaning the storage of textual material that is (largely) unformatted|plain text}}
----
{{more citations needed|date=June 2011}}
In [[cryptography]], '''plaintext''' is information used as input to an [[encryption algorithm]]; the output is termed '''ciphertext'''. The plaintext could be, for example, a diplomatic message, a bank transaction, an e-mail, a diary and so forth — any information that someone might want to prevent others from reading. Typically the plaintext is the message in a form where no special effort has been made to make the information unreadable without special knowledge. In some systems, however, multiple layers of encryption are used, in which case the ciphertext output of one encryption algorithm becomes the plaintext input to the next.


In [[cryptography]], '''plaintext''' usually means unencrypted information pending input into [[cryptographic algorithm]]s, usually [[encryption]] algorithms. This usually refers to data that is transmitted or stored unencrypted.
==Secure handling of plaintext==


==Overview==
In a [[cryptosystem]], weaknesses can be introduced through insecure handling of the plaintext, allowing an attacker to bypass the cryptography altogether. Plaintext is vulnerable in use and in storage, whether in electronic or paper format. The area of [[physical security]] deals with how media can be secured from local attacks. An attacker might enter a poorly secured building and attempt to open locked desk drawers or [[safe]]s. An attacker can also engage in [[dumpster diving]], and may be able to reconstruct shredded sheets. One countermeasure is to burn or thoroughly crosscut shred discarded printed plaintexts. (''See'' [[Paper shredder]] for specifications.) If plaintext is kept in a [[computer file]], the disk along with the entire computer and its components must be secure. Sensitive data is sometimes processed on computers whose mass storage is removable, in which case physical security of the removed disk is vital. In the case of securing a computer, that security must be physical (e.g., against [[burglary]], brazen removal under cover of a repair, installation of covert monitoring devices, etc.) as well as virtual (e.g., [[operating system]] modification, illicit network access, [[Trojan horse (computing)|Trojan]] programs, ...). The wide availability of [[keydrives]], which can plug into most modern computers and receive hundreds of megabytes of data, poses another security headache. A spy (perhaps posing as a cleaning person) could easily conceal one and even swallow it, if necessary.
With the advent of [[computing]], the term ''plaintext'' expanded beyond human-readable documents to mean any data, including binary files, in a form that can be viewed or used without requiring a key or other decryption device. Information—a message, document, file, etc.—if to be communicated or stored in an unencrypted form is referred to as plaintext.


Plaintext is used as input to an [[encryption algorithm]]; the output is usually termed [[ciphertext]], particularly when the algorithm is a [[cipher]]. [[Codetext]] is less often used, and almost always only when the algorithm involved is actually a [[code]]. Some systems use multiple layers of [[encryption]], with the output of one encryption algorithm becoming "plaintext" input for the next.
Discarded computers, disk drives and media are also a potential source of plaintexts. Most operating systems do not actually erase anything &mdash; they simply mark the disk space occupied by a deleted file as 'available for use', and remove its entry from the file system [[directory]]. The information in a file deleted in this way remains fully present until overwritten at some later time when the operating system reuses the disk space. With even low-end computers being sold with 30 Gigabytes of disk space, this 'later time' may be months, or never. Even overwriting that part of a disk occupied by a deleted file is insufficient in many cases. [[Peter Gutmann]] of the [[University of Auckland]] wrote a celebrated paper some years ago<!--how long exactly) on the recovery of overwritten information from magnetic disks (though it must be noted that drive densities have got much higher since then which should make this type of recovery much harder if not impossible). Also modern hard drives remap sectors that are starting to fail and the sectors that are no longer in use will contain information that is invisible to software but is nonetheless still there on the physical platter. Some government agencies (e.g., [[NSA]]) require that all disk drives be physically pulverized when they are discarded, and in some cases, chemically treated with corrosives before or after. This practice is not widespread outside of the government, however. For example, Garfinkel and Shelat (2003) analysed 158 second-hand hard drives and found that less than 10% had been sufficiently sanitised; a wide variety of personal and confidential information was found amongst the others. See [[data remanence]].


==Secure handling==
Laptop computers are a special problem. The US State Department, the British Secret Service, and the US Department of Defense have all had laptops containing secret information, presumably in readable text form, 'vanish' in recent years. [[Disk encryption]] techniques can provide protection if they are used properly.
Insecure handling of plaintext can introduce weaknesses into a [[cryptosystem]] by letting an attacker bypass the cryptography altogether. Plaintext is vulnerable in use and in storage, whether in electronic or paper format. ''[[Physical security]]'' means the securing of information and its storage media from physical, attack—for instance by someone entering a building to access papers, storage media, or computers. Discarded material, if not disposed of securely, may be a security risk. Even [[paper shredder|shredded]] documents and erased magnetic media might be reconstructed with sufficient effort.


If plaintext is stored in a [[computer file]], the storage media, the computer and its components, and all backups must be secure. Sensitive data is sometimes processed on computers whose mass storage is removable, in which case physical security of the removed disk is vital. In the case of securing a computer, useful (as opposed to [[handwaving]]) security must be physical (e.g., against [[burglary]], brazen removal under cover of supposed repair, installation of covert monitoring devices, etc.), as well as virtual (e.g., [[operating system]] modification, illicit network access, [[Trojan horse (computing)|Trojan]] programs). Wide availability of [[keydrives]], which can plug into most modern computers and store large quantities of data, poses another severe security headache. A spy (perhaps posing as a cleaning person) could easily conceal one, and even swallow it if necessary.
Modern cryptographic systems are designed to resist attacks based on [[known plaintext]] or even [[chosen plaintext]]. Older systems used techniques such as [[Padding (cryptography)|padding]] and [[Russian copulation]] to obscure information in plaintext that would be known or easily guessed.

[[Discarded computers]], disk drives and media are also a potential source of plaintexts. Most operating systems do not actually erase anything&mdash; they simply mark the disk space occupied by a deleted file as 'available for use', and remove its entry from the file system [[directory (file systems)|directory]]. The information in a file deleted in this way remains fully present until overwritten at some later time when the operating system reuses the disk space. With even low-end computers commonly sold with many gigabytes of disk space and rising monthly, this 'later time' may be months later, or never. Even overwriting the portion of a disk surface occupied by a deleted file is insufficient in many cases. [[Peter Gutmann (computer scientist)|Peter Gutmann]] of the [[University of Auckland]] wrote a celebrated 1996 paper on the recovery of overwritten information from magnetic disks; areal storage densities have gotten much higher since then, so this sort of recovery is likely to be more difficult than it was when Gutmann wrote.

Modern hard drives automatically remap failing sectors, moving data to good sectors. This process makes information on those failing, excluded sectors invisible to the file system and normal applications. Special software, however, can still extract information from them.

Some government agencies (e.g., US [[NSA]]) require that personnel physically pulverize discarded disk drives and, in some cases, treat them with chemical corrosives. This practice is not widespread outside government, however. Garfinkel and Shelat (2003) analyzed 158 second-hand hard drives they acquired at garage sales and the like, and found that less than 10% had been sufficiently sanitized. The others contained a wide variety of readable personal and confidential information. See [[data remanence]].

Physical loss is a serious problem. The [[US State Department]], [[US Department of Defense|Department of Defense]], and the [[British Secret Service]] have all had laptops with secret information, including in plaintext, lost or stolen. Appropriate [[disk encryption]] techniques can safeguard data on misappropriated computers or media.

On occasion, even when data on host systems is encrypted, media that personnel use to transfer data between systems is plaintext because of poorly designed data policy. For example, in October 2007, [[Loss of United Kingdom child benefit data (2007)|HM Revenue and Customs lost CDs]] that contained the unencrypted records of 25 million child benefit recipients in the United Kingdom.

Modern cryptographic systems resist [[known plaintext]] or even [[chosen plaintext]] attacks, and so may not be entirely compromised when plaintext is lost or stolen. Older systems resisted the effects of plaintext data loss on security with less effective techniques—such as [[Padding (cryptography)|padding]] and [[Russian copulation]] to obscure information in plaintext that could be easily guessed.


==See also==
==See also==
*[[cleartext]]
*[[Ciphertext]]
*[[RED/BLACK concept]]
*[[Red/black concept]]


==References==
==References==
* S. Garfinkel and A Shelat, "Remembrance of Data Passed: A Study of Disk Sanitization Practices", IEEE Security and Privacy, January/February 2003 [http://www.computer.org/security/garfinkel.pdf (PDF)].
* S. Garfinkel and A Shelat, "Remembrance of Data Passed: A Study of Disk Sanitization Practices", IEEE Security and Privacy, January/February 2003 https://creativecommons.org/licenses/by-sa/3.0/
* UK HM Revenue and Customs loses 25m records of child benefit recipients [http://news.bbc.co.uk/2/hi/uk_news/politics/7104368.stm BBC]

*Kissel, Richard (editor). (February, 2011). [http://csrc.nist.gov/publications/nistir/ir7298-rev1/nistir-7298-revision1.pdf NIST IR 7298 Revision 1, Glossary of Key Information Security Terms (https://creativecommons.org/licenses/by-sa/3.0/)]. National Institute of Standards and Technology.
[[de:Klartext]]
[[es:Archivo de texto]]
[[ja:平文]]


{{Reflist}}
[[Category:Cryptography]]-->


[[Category:Cryptography]]
==External links==
* [http://www.platinum-first.com/Google-Adsense.php Google Adsense marketing]

Latest revision as of 16:46, 22 May 2024

In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. This usually refers to data that is transmitted or stored unencrypted.

Overview[edit]

With the advent of computing, the term plaintext expanded beyond human-readable documents to mean any data, including binary files, in a form that can be viewed or used without requiring a key or other decryption device. Information—a message, document, file, etc.—if to be communicated or stored in an unencrypted form is referred to as plaintext.

Plaintext is used as input to an encryption algorithm; the output is usually termed ciphertext, particularly when the algorithm is a cipher. Codetext is less often used, and almost always only when the algorithm involved is actually a code. Some systems use multiple layers of encryption, with the output of one encryption algorithm becoming "plaintext" input for the next.

Secure handling[edit]

Insecure handling of plaintext can introduce weaknesses into a cryptosystem by letting an attacker bypass the cryptography altogether. Plaintext is vulnerable in use and in storage, whether in electronic or paper format. Physical security means the securing of information and its storage media from physical, attack—for instance by someone entering a building to access papers, storage media, or computers. Discarded material, if not disposed of securely, may be a security risk. Even shredded documents and erased magnetic media might be reconstructed with sufficient effort.

If plaintext is stored in a computer file, the storage media, the computer and its components, and all backups must be secure. Sensitive data is sometimes processed on computers whose mass storage is removable, in which case physical security of the removed disk is vital. In the case of securing a computer, useful (as opposed to handwaving) security must be physical (e.g., against burglary, brazen removal under cover of supposed repair, installation of covert monitoring devices, etc.), as well as virtual (e.g., operating system modification, illicit network access, Trojan programs). Wide availability of keydrives, which can plug into most modern computers and store large quantities of data, poses another severe security headache. A spy (perhaps posing as a cleaning person) could easily conceal one, and even swallow it if necessary.

Discarded computers, disk drives and media are also a potential source of plaintexts. Most operating systems do not actually erase anything— they simply mark the disk space occupied by a deleted file as 'available for use', and remove its entry from the file system directory. The information in a file deleted in this way remains fully present until overwritten at some later time when the operating system reuses the disk space. With even low-end computers commonly sold with many gigabytes of disk space and rising monthly, this 'later time' may be months later, or never. Even overwriting the portion of a disk surface occupied by a deleted file is insufficient in many cases. Peter Gutmann of the University of Auckland wrote a celebrated 1996 paper on the recovery of overwritten information from magnetic disks; areal storage densities have gotten much higher since then, so this sort of recovery is likely to be more difficult than it was when Gutmann wrote.

Modern hard drives automatically remap failing sectors, moving data to good sectors. This process makes information on those failing, excluded sectors invisible to the file system and normal applications. Special software, however, can still extract information from them.

Some government agencies (e.g., US NSA) require that personnel physically pulverize discarded disk drives and, in some cases, treat them with chemical corrosives. This practice is not widespread outside government, however. Garfinkel and Shelat (2003) analyzed 158 second-hand hard drives they acquired at garage sales and the like, and found that less than 10% had been sufficiently sanitized. The others contained a wide variety of readable personal and confidential information. See data remanence.

Physical loss is a serious problem. The US State Department, Department of Defense, and the British Secret Service have all had laptops with secret information, including in plaintext, lost or stolen. Appropriate disk encryption techniques can safeguard data on misappropriated computers or media.

On occasion, even when data on host systems is encrypted, media that personnel use to transfer data between systems is plaintext because of poorly designed data policy. For example, in October 2007, HM Revenue and Customs lost CDs that contained the unencrypted records of 25 million child benefit recipients in the United Kingdom.

Modern cryptographic systems resist known plaintext or even chosen plaintext attacks, and so may not be entirely compromised when plaintext is lost or stolen. Older systems resisted the effects of plaintext data loss on security with less effective techniques—such as padding and Russian copulation to obscure information in plaintext that could be easily guessed.

See also[edit]

References[edit]