Preview

Cryptanalysis

Powerful Essays
Open Document
Open Document
1790 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cryptanalysis
UNIVERSITY OF CENTRAL LANCASHIRE

MODULE : COMPUTER SECURITY (CO4509)
TUTOR: MARTIN BATEMAN

Assignment – literature investigation

submitted by – PYARELAL BANGLOORI
Reg. no: 20447838
Theory of Cryptanalysis

Introduction
Cryptanalysis is a very sophisticated science that encompasses a wide variety of test and attacks. Cryptanalysis is the science of studying and breaking the secrecy of encryption processes, compromising authentication schemes, and reverse-engineering algorithms and keys. Cryptanalysis is a significant part of cryptography and cryptology. When considered by the programmers, cryptanalysis is proposed to find flaws and limitations so that security system can be improved.
It is also used by hackers to find the flaws, just to gain an encryption code of not permitted access to the secret information.

Basic principles and theory of cryptanalysis
Cryptanalysis is the study of defeating the methods generated by cryptography. The aim is to find out some flaws in a cryptographic scheme. Cryptology is the combined study of both cryptography and cryptanalysis.
Cryptanalysis is frequently considered by hackers, attackers, to sabotage the security system. Main aim of an attacker is to study the mechanism which the cryptosystem’s users like to keep undisclosed. For E.g. in the World War II Enigma Machine Mechanism was broken. It was a substitution encryption mechanism. Although the encryption system of the Enigma was complex for the time, a group of Polish cryptographers decrypted its code and gave Britain insight into Germany’s attack plans and military movement. It is considered that cracking Enigma encryption mechanism abridged World War II by two years.
Cryptanalysis is also used by programmers and others try to assess whether a method has any weaknesses. This is a normal



References: 1. Cryptography And Network Security/ I.A. Dhotre V.S. Bagad, 2008. 2. Certified Information System Security Professional/ Roberta Bragg, 2003, page 307-327. 3. Introduction to Cryptography: Principles and Applications/ Hans Delfs, Helmut Knebl 2002, page 4. 4. Basic Methods of Cryptography/ Jan C.A Lubbe, 1998. 5. www.guardian.co.uk/technology/2010/feb/03/cyber-warfare-growing-threat 6. www.nytimes.com/2010/02/22/technology/22cyber.html 7. www.topnews.in/recession-triggering-boom-cybercrime-2203596 8. www.crime-research.org/news/01.06.2004/283/ 9. The Ethical Hack: A Framework For Business Value Penetration Testing/ James S. Tiller, 2005.

You May Also Find These Documents Helpful