Uninformed: Informative Information for the Uninformed

Vol 9» 2008.Jan


Weaknesses

Due to the cryptographically weak properties of using functions such as XOR to obfuscate data, there exist well known attacks against these methods and their keying information. Although payload encoders which employ XOR as their obfuscation algorithm have been discussed extensively throughout this paper, it is not the author's intent to tie the the contextual keying technique presented here to such algorithms. Rather, contextual keying could just as readily be used with cryptographically strong encoding algorithms as well. As such, attacks against the encoding algorithm used, or specifically against the XOR algorithm, are outside the scope of this paper and will not be detailed herein.