Professional Documents
Culture Documents
7376211cs271-Sanjay Kumar M R
7376211cs271-Sanjay Kumar M R
CRYPTOGRAPHIC ATTACKS
2024OD100
DEPARTMENT OF CSE
1. What is cryptography?
By using codes, cryptography is a technique for encrypting data and communications so that
only the intended audience can read and comprehend it.
In computer science, the term "cryptography" refers to safe information and communication
methods that use mathematical principles and a system of calculations based on rules, or
"algorithms," to change messages in ways that are challenging to read. These deterministic
algorithms are employed in the creation of cryptographic keys, digital signature, online browsing
on the internet, and private communications like email and credit card transactions.
2. Cryptanalysis methods:
The fields of cryptology and cryptanalysis are closely related to that of cryptography. It
comprises methods for concealing data while it is being stored or transported, including
microdots, word-image fusion, and other techniques. But in today's computer-dominated world,
cryptography is most frequently understood as the act of turning plaintext (common text, also
known as cleartext) into ciphertext and back again (decryption). Those who work in this area are
referred to as cryptographers.
3.Cryptography concerns:
Attackers are able to defeat cryptography, gain access to the computers in charge of data
encryption and decryption, and take advantage of shoddy implementations such the usage of
default keys. Cryptography, on the other hand, makes it more difficult for attackers to access
messages and data that are encrypted.
NIST issued a call for papers among the mathematical and scientific community in 2016 for new
public key cryptography standards in response to growing worries that quantum computing's
processing capacity could be used to crack current encryption standards.
Quantum computing, in contrast to conventional computing, uses quantum bits (qubits), which
may simultaneously execute two calculations and represent both 0s and 1s.
1
Assignment Series 88 2024OD100
4.Purpose of cryptography:
2
Assignment Series 88 2024OD100
5.Cryptographic attack:
>>Passive assaults:
>>Active attacks:
include changing the data or transmission in some way. In this instance, the attacker
manipulates the data in addition to gaining access to it.
These attacks can be broadly categorised into six groups based on the type of
cryptographic system in use and the information provided to the attacker:
>>Brutal assault:
In a cryptographic system, public and private keys are crucial for encrypting and
decrypting data. An encrypted message or piece of data is decoded using a variety of
private keys in a brute force assault. There are 256 (or 28) potential keys if the key size
is 8 bits. To use this attack tactic, the cybercriminal needs to be familiar with the
algorithm, which is typically available as open-source software.
3
Assignment Series 88 2024OD100
7. Conclusion:
We use different types of algorithms to establish security services in different service
mechanisms.
We use either private key cryptography or public key cryptography according to
requirement.
If we want to send message quickly we use private key algorithm and if we want to send
messages secretly we use public key algorithm
BIBILIOGRAPHY:
1.https://www.fortinet.com/resources/cyberglossary/what-is-cryptography#:~:text=Cryptography%20is
%20the%20process%20of,%2C%20computer%20passwords%2C%20and%20ecommerce.
2.https://www.geeksforgeeks.org/cryptography-and-its-types/