Saturday, October 19, 2019
IT - Attacking Cryptography Essay Example | Topics and Well Written Essays - 1250 words
IT - Attacking Cryptography - Essay Example Security requires constant and periodic changes to pace up and counter the threats that are ever increasing. Similarly, cryptography also goes with the same approach of upgrading new state of the art encryption algorithms one after another and from safe to the safest, so that it cannot be cracked. Lastly, the future concerns for blow fish encryption algorithm are associated with minimizing the use of S boxes along with less iterative processes along with sub key calculation on the fly. Two fish that is considered to be the next state of the art encryption algorithm after blow fish will be considered as AES final with 128 bit block size and can handle more operations. Two fish incorporates a 16 round structure with additional options for inputs and outputs, as the plain text is converted in to 32 bit words. The inputs incorporates four key words followed by sixteen rounds and each round, two words on the left are utilized as inputs to the function donated by ââ¬Ëgââ¬â¢ (Stinson and Tavares ). ... S-boxes are dependent on large keys that are more resilient to cryptanalysis (Anderson. n.d). Moreover, permutations are key dependent with a support of diverse operations associated with mathematics that is integrated with XOR and addition (Anderson). For attacking the encrypted files, Charlie can use many attack methods for retrieving the password files stored in the database maintained by ââ¬Ëkeepassââ¬â¢. The plaintext and cipher text methods of attacks incorporates a cryptanalyst that has an access to plaintext and the conforming cipher text and pursues to find association in between the two. Whereas, a cipher text is associated with an attack in which cryptanalyst is accessible to cipher text and do not have access to conforming plaintext. Charlie can use generic ciphers such as Caesar, frequency analysis for cracking the cipher on Aliceââ¬â¢s workstation. Moreover, Charlie can also use a plaintext and chosen cipher text attack for retrieving the passwords. This type o f attack incorporates a cryptanalyst that is capable of encrypting a plaintext of choice and examines the results of cipher text. This type of attack is most generic for asymmetric cryptography, as Charlie can gain public key via cryptanalyst. Charlie can also choose cipher text attack that incorporates a cryptanalyst selecting a cipher text that seeks for a similar plaintext. Charlie can decrypt oracle that is a machine for decrypting data without exposure of key. Moreover, Charlie can also execute the attack on public key encryption, as it initiate with a cipher text and seeks for similar matched plaintext data available publically. Charlie can also utilize adaptive attacks (Krawczyk), as these attacks incorporate a cryptanalyst that selects plaintext or cipher text
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.