Crypto Analysis

Read Complete Research Material

CRYPTO ANALYSIS

Crypto Analysis



Crypto Analysis

Component 1 (Literature Review)

Cryptography is defined as “the science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like”. It builds upon low-level cryptographic algorithms that are called cryptographic primitives. Cryptographic devices, on the other hand, are the climax of one or more cryptographic primitives, forming constructs for example cryptosystems and cryptographic protocols. It is a complex and mathematically challenging field of study. It involves taking some data or message and obfuscating it in order that it is unreadable by parties that the message was not intended. Before the message becomes encrypted it is mentioned to as the plain text . Once a message becomes encrypted it is then mentioned to as the cipher text. Cryptology is the study of cryptography and cryptanalysis (Barker, 2002, pp.26).

The study of cipher text in an attempt to restore the message to plaintext is renowned as cryptanalysis. Cryptanalysis is identically mathematically challenging and complex as cryptography. Because of the complexity involved with cryptanalysis work this paper is only focused on the rudimentary techniques required to decipher monoalphabetic encryption ciphers and cryptograms (Barker, 2002, pp.44).

Plaintext is the original data before being encrypted and the data of the encryption output is called ciphertext or cryptogram. The methods which used to encrypt plaintext is called ciphers.

Cryptanalysis is the study of methods of shattering ciphers. And the way to strike the cipher can be easily split up into two components described below:

Exhaustive attack: Also called Brute-force attack which is an attack that would try all possible keys until the attacker strikes the right key.

For example: encrypting by a 3-digits-number key, the exhaustive attack for the encryption is seeking from 000 to 999 until the right key hit.

Statistics attack: Comparing to the exhaustive attack, statistics attack is a kind of systematical sttack after discerning input and output or some other effects.

For example: power consuming.

When cryptologists converse about encryptions, there are some roles involved inside for example message sender, receiver or attackers. There is a straightforward way to distinct these roles by naming the roles. Starting with the alphabet are Alice and Bob, two parties liking to communicate in a secure manner. When more people are in the communication group, Carol and Dave will be used. Eve is a passive attacker who can get the information from Alice and Bob. Mallory is another attacker who can get the information and even modify the data between Alice and Bob. Trent is a individual who is trusted by all engaged parties. Walter is a man who would protect Alice and Bob with some aspect. This is the basic sense about the communication family (Barker, 2006, pp.122).

There are three major purposes in cryptography listed as following: First, creating confidentiality. Second, giving authentication which is utilised to identify if the message sender is the legal one or not.

Data encryption process

Generally speaking, the two cipher modes overhead are the two key systems we use to encrypt in cryptography ...
Related Ads