ZIP Attacks with Reduced Known Plaintext

  title={ZIP Attacks with Reduced Known Plaintext},
  author={Michael A. Stay},
Biham and Kocher demonstrated that the PKZIP stream cipher was weak and presented an attack requiring thirteen bytes of plaintext. The deflate algorithm “zippers” now use to compress the plaintext before encryption makes it difficult to get known plaintext. We consider the problem of reducing the amount of known plaintext by finding other ways to filter key guesses. In most cases we can reduce the amount of known plaintext from the archived file to two or three bytes, depending on the zipper… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.


Publications referenced by this paper.
Showing 1-2 of 2 references

Eli and Paul Kocher

  • Biham
  • “A Known Plaintext Attack on the PKZIP Stream…
  • 1994
Highly Influential
8 Excerpts


  • Kocher
  • ZIPCRACK 2.00 Documentation.
  • 1992
1 Excerpt