Viber Communication Security - Bad Request
Viber Communication Security - Bad Request
Viber Communication Security - Bad Request
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Experiments Chapter 3<br />
3.2.5 Cryptanalysis<br />
Value Description<br />
4b198067 Known Header<br />
3ca5 Sequence Number<br />
3d351c86 Time<br />
eb6e70fb Constant<br />
e6 Network Quality?<br />
Table 6: Analysis of header data in voice messages.<br />
Hex Frequency<br />
0 6.23839<br />
1 6.13784<br />
2 6.07624<br />
3 6.13482<br />
4 6.1007<br />
5 6.69676<br />
6 5.99381<br />
7 6.73028<br />
8 6.05782<br />
9 6.04726<br />
a 6.10765<br />
b 6.0853<br />
c 6.03457<br />
d 6.73873<br />
e 6.05994<br />
f 6.75987<br />
Table 7: Frequency analysis of data in voice packets.<br />
After getting to the voice data in the messages there was not enough time left to get to the bottom<br />
of the cryptography used in the protocol. In paragraph 3.2.3 a frequency analysis has been done<br />
but this of course isn’t particularly useful against data that by nature is already very random. We<br />
can say that because the length of the payload of each packet differs significantly and the smallest<br />
deviation is only one byte, a block cipher seems out of the question and if encryption would be used<br />
it will be a stream cipher.<br />
Of course the question still remains: is it scrambled or encrypted?<br />
24