Jump to content

Plaintext: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
KyraVixen (talk | contribs)
rv-v
Replaced page with ' == HACKED!!! =='
Line 1: Line 1:
{{otheruses4|cryptography|the computing term meaning the storage of textual material that is (largely) unformatted|plain text}}


== HACKED!!! ==
In [[cryptography]], '''plaintext''' is information used as input to an [[encryption algorithm]]; the output is termed '''[[encryption|ciphertext]]'''. The plaintext could be, for example, a diplomatic message, a bank transaction, an e-mail, a diary and so forth — any information that someone might want to prevent others from reading. Typically the plaintext is the message in a form where no special effort has been made to make the information unreadable without special knowledge. In some systems, however, multiple layers of encryption are used, in which case the ciphertext output of one encryption algorithm becomes the plaintext input to the next.

==Secure handling of plaintext==

In a [[cryptosystem]], weaknesses can be introduced through insecure handling of the plaintext, allowing an attacker to bypass the cryptography altogether. Plaintext is vulnerable in use and in storage, whether in electronic or paper format. The area of [[physical security]] deals with how media can be secured from local attacks. An attacker might enter a poorly secured building and attempt to open locked desk drawers or [[safe]]s. An attacker can also engage in [[dumpster diving]], and may be able to reconstruct shredded sheets. One countermeasure is to burn or thoroughly crosscut shred discarded printed plaintexts. (''See'' [[Paper shredder]] for specifications.) If plaintext is kept in a [[computer file]], the disk along with the entire computer and its components must be secure. Sensitive data is sometimes processed on computers whose mass storage is removable, in which case physical security of the removed disk is vital. In the case of securing a computer, that security must be physical (e.g., against [[burglary]], brazen removal under cover of a repair, installation of covert monitoring devices, etc.) as well as virtual (e.g., [[operating system]] modification, illicit network access, [[Trojan horse (computing)|Trojan]] programs, ...). The wide availability of [[keydrives]], which can plug into most modern computers and receive hundreds of megabytes of data, poses another security headache. A spy (perhaps posing as a cleaning person) could easily conceal one and even swallow it, if necessary.

Discarded computers, disk drives and media are also a potential source of plaintexts. Most operating systems do not actually erase anything &mdash; they simply mark the disk space occupied by a deleted file as 'available for use', and remove its entry from the file system [[directory (file systems)|directory]]. The information in a file deleted in this way remains fully present until overwritten at some later time when the operating system reuses the disk space. With even low-end computers being sold with 30 Gigabytes of disk space, this 'later time' may be months, or never. Even overwriting that part of a disk occupied by a deleted file is insufficient in many cases. [[Peter Gutmann]] of the [[University of Auckland]] wrote a celebrated paper some years ago<!--how long exactly)--> on the recovery of overwritten information from magnetic disks (though it must be noted that drive densities have got much higher since then which should make this type of recovery much harder if not impossible). Also modern hard drives remap sectors that are starting to fail and the sectors that are no longer in use will contain information that is invisible to software but is nonetheless still there on the physical platter. Some government agencies (e.g., [[NSA]]) require that all disk drives be physically pulverized when they are discarded, and in some cases, chemically treated with corrosives before or after. This practice is not widespread outside of the government, however. For example, Garfinkel and Shelat (2003) analysed 158 second-hand hard drives and found that less than 10% had been sufficiently sanitised; a wide variety of personal and confidential information was found amongst the others. See [[data remanence]].

Laptop computers are a special problem. The US State Department, the British Secret Service, and the US Department of Defense have all had laptops containing secret information, presumably in readable text form, 'vanish' in recent years. [[Disk encryption]] techniques can provide protection if they are used properly.

Modern cryptographic systems are designed to resist attacks based on [[known plaintext]] or even [[chosen plaintext]]. Older systems used techniques such as [[Padding (cryptography)|padding]] and [[Russian copulation]] to obscure information in plaintext that would be known or easily guessed.

==See also==
*[[cleartext]]
*[[RED/BLACK concept]]

==References==
* S. Garfinkel and A Shelat, "Remembrance of Data Passed: A Study of Disk Sanitization Practices", IEEE Security and Privacy, January/February 2003 [http://www.computer.org/security/garfinkel.pdf (PDF)].

[[Category:Cryptography]]

[[de:Textdatei]]
[[es:Archivo de texto]]
[[eo:Plata teksto]]
[[fr:Fichier texte]]
[[ja:平文]]
[[ru:Текстовый файл]]

Revision as of 23:34, 11 March 2007

HACKED!!!