[Webinar] SpiraTest - Setting New Standards in Quality Assurance
Synopsis cryptanalysis
1. A Synopsis Report
On
Different types of cryptanalysis
Submitted To
Lovely Professional University
Proposed Features Report
For The Award of Degree
BCA Hon (Bachelor of Computer Application (Hon))
Submitted To Submitted By
Puneet Kumar Kaushal Abhinav Kumar
Lovely Professional University 11002742
2. Acknowledgment
I have taken struggles in this synopsis. However, it would not have been possible without the kind support and
help of many individuals and organizations. I would like to extend my truthful thanks to all of them.
I am highly thankful to Mr. Puneet Kumar Kaushal for their guidance and constant supervision as well as for
providing necessary information regarding the Term Paper.
I would like to express my gratitude towards my parents & member of Lovely Professional University for their
kind co-operation and encouragement which help me in to start the Synopsis.
To complete the Term Paper more facts needed on the topic “Different types of cryptanalysis” from Mr.
Puneet Kumar Kaushal .
Abhinav
3. Introduction
Cryptanalysis is the art and science of analyzing information systems in order to study the hidden
aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain
access to the contents of encrypted messages, even if the cryptographic key is unknown.
Different types of cryptanalysis
Depending on what a cryptanalyst has to work with, attacks can be classified into
1. Cipher text only attack –
The only data available is a target cipher text
2. Known plaintext attack –
A target cipher text
Pairs of other cipher text and plaintext (say, previously broken)
3. Chosen plaintext attack –
A target cipher text
Can feed encryption algorithm with plaintexts and obtain the matching cipher texts.
4. Chosen cipher text attack –
A target cipher text
4. Can feed decryption algorithm with cipher texts and obtain the matching
plaintexts
Computational resources required
Attacks can also be characterized by the resources they require. Those resources include:
Time — the number of computation steps (like encryptions) which must be performed.
Memory — the amount of storage required to perform the attack.
Data — the quantity of plaintexts and ciphertexts required.
Strategy
1. Try to get the details of DES cracker if avail on Internet or on books.
2. Try to get the details of Cracking Techniques by which cracker gain access to serial number and
another encrypted data.
3. And another attack which were successful in past.
Reference
http://en.wikipedia.org/wiki/Cryptanalysis
Cryptography And Network Security- William Stallings