17.12.2012 Views

Viber Communication Security - Bad Request

Viber Communication Security - Bad Request

Viber Communication Security - Bad Request

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Experiments Chapter 3<br />

3.2.5 Cryptanalysis<br />

Value Description<br />

4b198067 Known Header<br />

3ca5 Sequence Number<br />

3d351c86 Time<br />

eb6e70fb Constant<br />

e6 Network Quality?<br />

Table 6: Analysis of header data in voice messages.<br />

Hex Frequency<br />

0 6.23839<br />

1 6.13784<br />

2 6.07624<br />

3 6.13482<br />

4 6.1007<br />

5 6.69676<br />

6 5.99381<br />

7 6.73028<br />

8 6.05782<br />

9 6.04726<br />

a 6.10765<br />

b 6.0853<br />

c 6.03457<br />

d 6.73873<br />

e 6.05994<br />

f 6.75987<br />

Table 7: Frequency analysis of data in voice packets.<br />

After getting to the voice data in the messages there was not enough time left to get to the bottom<br />

of the cryptography used in the protocol. In paragraph 3.2.3 a frequency analysis has been done<br />

but this of course isn’t particularly useful against data that by nature is already very random. We<br />

can say that because the length of the payload of each packet differs significantly and the smallest<br />

deviation is only one byte, a block cipher seems out of the question and if encryption would be used<br />

it will be a stream cipher.<br />

Of course the question still remains: is it scrambled or encrypted?<br />

24

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!