The larger the contiguous known plaintext, the faster the attack. To conduct this attack, it requires at least 12 bytes of known plaintext and at least 8 of them must be contiguous. Note: to generate a ZIP archive using ZipCrypto Store we can use the old zip utility: zip -e -0 archive.zip logo_acceis.svg or 7z: 7z a -tzip -mx0 -p -mem=ZipCrypto archive.zip logo_acceis.svg. To check which encryption algorithm is used you can use 7z: $ 7z l -slt archive.zip | grep Method It is also possible if the archive use ZipCrypto Deflate but it is harder since files are compressed before encryption.
Older encrypted ZIP archives can suffer from Biham and Kocher plaintext attack if they use the ZipCrypto Store encryption method. Note: This article is also available in french 🇫🇷. This is because the Microsoft Windows operating system does not allow to generate (without installing a third party software) encrypted Zip files and can only decrypt Zip archives using ZipCrypto, which makes this old and depreciated encryption method still used today. While most of the software use only AES encrypted ZIPs (or use AES encryption by default), some software still generate ZipCrypto encrypted archives by default.