Saturday, June 22, 2019

IT - Attacking Cryptography Essay Example | Topics and Well Written Essays - 1250 words

IT - Attacking Cryptography - Essay ExampleSecurity requires constant and periodic changes to pace up and counter the threats that atomic number 18 invariably increasing. Similarly, cryptography also goes with the same approach of upgrading new state of the art encryption algorithms one after another and from safe to the safest, so that it discountnot be cracked. Lastly, the in store(predicate) concerns for blow fish encryption algorithm are associated with minimizing the use of S boxes along with less iterative processes along with sub key calculation on the fly. Two fish that is considered to be the next state of the art encryption algorithm after blow fish will be considered as AES nett with 128 bit block size and can handle more operations. Two fish incorporates a 16 round structure with additional options for inputs and outputs, as the unfinished text is converted in to 32 bit words. The inputs incorporates four key words followed by sixteen rounds and each round, two word s on the leftfield are utilized as inputs to the function donated by g (Stinson and Tavares ). ... S-boxes are dependent on large keys that are more resilient to cryptanalysis (Anderson. n.d). Moreover, permutations are key dependent with a support of diverse operations associated with mathematics that is integrated with XOR and addition (Anderson). For ack-acking the encrypted files, Charlie can use many attack methods for retrieving the parole files stored in the database maintained by keepass. The plaintext and cipher text methods of attacks incorporates a cryptanalyst that has an access to plaintext and the conforming cipher text and pursues to find association in amongst the two. Whereas, a cipher text is associated with an attack in which cryptanalyst is accessible to cipher text and do not have access to conforming plaintext. Charlie can use generic ciphers such as Caesar, frequency analysis for cracking the cipher on Alices workstation. Moreover, Charlie can also use a p laintext and elect cipher text attack for retrieving the passwords. This type of attack incorporates a cryptanalyst that is capable of encrypting a plaintext of choice and examines the results of cipher text. This type of attack is most generic for asymmetric cryptography, as Charlie can gain public key via cryptanalyst. Charlie can also choose cipher text attack that incorporates a cryptanalyst selecting a cipher text that seeks for a similar plaintext. Charlie can decrypt oracle that is a machine for decrypting data without exposure of key. Moreover, Charlie can also execute the attack on public key encryption, as it initiate with a cipher text and seeks for similar matched plaintext data available publically. Charlie can also utilize adaptative attacks (Krawczyk), as these attacks incorporate a cryptanalyst that selects plaintext or cipher text

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.