it's about data security, cryptography will teach you about difficult algorithm to secure your data
sdjgfdferbfqkdfnakjdfnvakjdfvnadfkvn vjnad vnd skjvnerfkehnfiukjnerqnjefjnqlkf herfjhqerjfnhqgqjnqighqiugrnfqer guqerhfiuqhnerfkjndkjfnasmdfgh;oergh[q'eghqlkdfnkQ34H8R329467-9

Attribution Non-Commercial (BY-NC)

9 views

it's about data security, cryptography will teach you about difficult algorithm to secure your data
sdjgfdferbfqkdfnakjdfnvakjdfvnadfkvn vjnad vnd skjvnerfkehnfiukjnerqnjefjnqlkf herfjhqerjfnhqgqjnqighqiugrnfqer guqerhfiuqhnerfkjndkjfnasmdfgh;oergh[q'eghqlkdfnkQ34H8R329467-9

Attribution Non-Commercial (BY-NC)

- A Cryptographic Compendium
- Intelligent Systems for Information Security
- Using the GNU Privacy Guard
- Tech Mahindra - Suhas Desai -Open Source _Cry-Steganography 1.0
- IJETTCS-2014-07-17-49
- Military Networks by Disruption Tolerant Network Technology
- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
- Workshop 2
- Data Hiding in Video using Triangularization LSB Technique
- 20. Eng-SSCE Secure Communication Based on a Chaotic-P.karthik
- Engineering Research Brochure(1)
- A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
- IJETTCS-2013-08-21-107
- A Novel Ppdm Protocol for Distributed Peer to Peer Information Sources
- SNIAsecbookletfinal
- tut_1-1
- [IJCT-V3I2P3]
- 2013 WBUT
- phani-final123 (3)
- Mp3 Steganography_old

You are on page 1of 20

References: 1. Bruce, Applied Cryptography 2. William Stallings, Cryptography and Network Security

1

23/12/2013

Outlines

Brute force attack Avalanche effect Statistical attack

2

23/12/2013

3

23/12/2013

Cryptanalysis

Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the plaintext or some sample plaintext-ciphertext pairs. This attack exploits the characteristics of the algorithm to deduce a specific plaintext or to deduce the key being used.

23/12/2013

The attacker tries every possible key on a piece of ciphertext until the plaintext is meaningful.

4

Brute force attack is one of ciphertext-only attack. Attacker tries every possible key one by one until the resulting plaintext is meaningful. On average, half of all possible keys must be tried to achieve success.

23/12/2013

In Caesar Cipher, a brute force cryptanalysis is easily performed simply try all the 25 possible keys.

23/12/2013

23/12/2013

Three important characteristics of this problem enabled us to use a brute force cryptanalysis:

1. The encryption and decryption algorithms are known.

3. The language of the plaintext is known and easily recognizable.

The 3DES that makes use of a 168-bit key gives a key space of 2168 or greater than 3.7 x 1050 possible keys.

23/12/2013

The use of an algorithm that employs a large number of keys makes brute force cryptanalysis impractical.

If the language of the plaintext is unknown, then plaintext output may not be recognizable.

The input may be compressed in some fashion, again making recognition difficult.

23/12/2013

This figure shows a portion of a text file compressed using an algorithm called ZIP. If this file is then encrypted with a simple substitution cipher (expanded to include more than just 26 alphabetic characters), then the plaintext may not be recognized when it is uncovered in the brute force cryptanalysis.

23/12/2013

The greater security is achieved by greater resistance to brute force attack and greater confusion. If attack succeeds in deducing the key, the effect is CATASTROPHIC all the future and past messages encrypted with that key are compromised.

10

Avalanche Effect

11

23/12/2013

A small change in either the plaintext or the key should produce a significant change in the ciphertext. A one-bit change of key should produce a radical change in the ciphertext using the same plaintext. A one-bit change of plaintext should produce a radical change in the ciphertext using the same key. In particular, a change in one bit of the plaintext or one bit of the key should produce a change in many bits of the ciphertext.

12

23/12/2013

In DES algorithm: By allowing one bit to affect two substitutions (S-Box Substitution and P-Box Substitution), the dependency of the output bits on the input bits spreads faster.

23/12/2013

After five rounds every ciphertext bit is a function of every plaintext bit and every key bit.

After eight rounds the ciphertext was essentially a random function of every plaintext bit and every key bit.

13

DES example

23/12/2013

14

23/12/2013

15

Avalanche effect in DES change in plaintext

23/12/2013

16

23/12/2013

The fourth bit of the plaintext is changed, so that the plaintext is 12468aceeca86420. The second column of the table shows the intermediate 64-bit values at the end of each round for the two plaintext. The third column shows the number of bits that differ between the two intermediate values. The table shows that, after just three rounds, 18 bits differ between the two blocks. On completion, the two ciphertexts differ in 32 bit positions.

17

Avalanche effect in DES change in key

23/12/2013

18

23/12/2013

The fourth bit of the key is changed, so that the key is 0f1571c947d9e859 (original key: 1f1571c947d9e859). The results show that about half of the bits in the ciphertext differ and the avalanche effect is pronounced after just a few rounds.

19

HAPPY LEARNING!

20

23/12/2013

- A Cryptographic CompendiumUploaded byadilullo
- Intelligent Systems for Information SecurityUploaded byprasath
- Using the GNU Privacy GuardUploaded byinfobits
- Tech Mahindra - Suhas Desai -Open Source _Cry-Steganography 1.0Uploaded byMOSC2010
- IJETTCS-2014-07-17-49Uploaded byAnonymous vQrJlEN
- Military Networks by Disruption Tolerant Network TechnologyUploaded byATS
- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageUploaded byLeMeniz Infotech
- Workshop 2Uploaded byhpbaotho
- Data Hiding in Video using Triangularization LSB TechniqueUploaded byeditor3854
- 20. Eng-SSCE Secure Communication Based on a Chaotic-P.karthikUploaded byImpact Journals
- Engineering Research Brochure(1)Uploaded bypramani90
- A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYUploaded byCS & IT
- IJETTCS-2013-08-21-107Uploaded byAnonymous vQrJlEN
- A Novel Ppdm Protocol for Distributed Peer to Peer Information SourcesUploaded byIAEME Publication
- SNIAsecbookletfinalUploaded bySathish Sagar
- tut_1-1Uploaded byCái Nhiếp
- [IJCT-V3I2P3]Uploaded byIjctJournals
- 2013 WBUTUploaded byMainak Sen
- phani-final123 (3)Uploaded byAsif Iqbal
- Mp3 Steganography_oldUploaded bySoumik Nag
- Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N 1024 Bit and 4096 BitUploaded byAI Coordinator - CSC Journals
- v54-110Uploaded byluisgamez
- 10-2.1.1.103Uploaded byJan-Willem Bullée
- A New Correlation Reduction Approach for Digital Image Encryption based on Switching and Pixel Explosion TechniquesUploaded byInnovative Research Publications
- 12 Security IUploaded byAbdullah Salem
- IJETR031305Uploaded byerpublication
- h 0362052056Uploaded byinventionjournals
- Smart Internal Combusion Engine Exaust Monitoring & Control SystemUploaded byEditor IJRITCC
- ssl network security (tinoarifcahya,s.kom)Uploaded byTino Arif Cahya Adi Nugraha
- curriculum vitae of saurav bhattacharjeeUploaded byapi-267810521

- BAB XII Pengembangan Mutakhir Teknologi Dan Aplikasi SatelitUploaded byAnnisa Sarah
- WiFi Network on DronesUploaded byAnnisa Sarah
- [ARTICLES] Green ICT Standards - ITU.pdfUploaded byAnnisa Sarah
- lora tech intro.pdfUploaded byRoberto Ambrozio
- Dastel - Teori FM PMUploaded byAnnisa Sarah
- [REP] Analysys Mason Wireless Traffic APAC Dec2013 Samples ToC RDRP0Uploaded byAnnisa Sarah
- Strategies for 4g Lte Deployme.pdfUploaded byAnnisa Sarah
- Errors 1Uploaded byAnnisa Sarah
- Fourier transform pptUploaded bySai Kiran
- 9780472034758-unit1Uploaded bymjtbbhrm
- Keysight KTH Wireless Seminar IntroUploaded byAnnisa Sarah
- Path_loss_modelsUploaded byHugo Valvassori
- Reading Practice 1 IELTS Academic QuestionsUploaded byndasoshy

- A Worked ExampleUploaded byghionoiuc
- CryptographyUploaded byHarish Kumar
- Lec01_IntroUploaded byJessica Martinez
- KSY14A Lecture 1-5 [Režim Kompatibility]Uploaded byDaniel Albrecht
- neelam 1.pdfUploaded byNEELAM KUMARI B
- ICDE Tutorial FinalUploaded byJitendra Singh Rauthan
- B.tech CS S8 Security in Computing Notes Module 3Uploaded byJisha Shaji
- Lecture 3Uploaded byLokesh Gautam
- Smart Card BasicsUploaded bymesminthomas
- Cryptography - CISSP Study Guide on CryptographyUploaded bycranckcracker123
- SecurityUploaded bychattan
- Building Blocks of ECommerceUploaded byAnonymous BOOmZG
- History of Cryptography-AnswersUploaded bykhey
- Unit5- network securityUploaded byAkhilesh Kumar
- Secure Image Transmission Using Stochastic DiffusionUploaded byEditor IJRITCC
- DepeUploaded byDe Pe
- PPT_10[1]Uploaded bysantu15038847420
- Introduction to Cryptography-AnswersUploaded bykhey
- A Recent Study of Various Encryption and Decryption TechniquesUploaded byIRJAES
- 1. INTRODUCTION NETWORK SECURITY.pptxUploaded byFauzia Ningrum
- Network SecurityUploaded byJavaid Ahmad
- Volume 1 Issue 5Uploaded byIJAET Journal
- ch01Uploaded bySwati Choudhary
- NS-UNIT-IIUploaded byKiran Mayie
- 5Uploaded byKumarecit
- Secure Data Deduplication and Auditing for Cloud Data Storage 1 1 (1)Uploaded byInternational Journal of Innovative Science and Research Technology
- Thesis- Project reportUploaded byjay patel
- Bit Locker Cipher 200608Uploaded byRavinder Beniwal
- HiSea: A Non Binary Toy CipherUploaded byJournal of Computing
- Cryptography Chapter 8Uploaded byAnonymous pCxu5VVfA