Attacks on cryptosystems-cryptography, Computer Network Security

Assignment Help:

Attacks on Cryptosystems
Attacks are attempts to achieve unauthorized access to secure communications have characteristically used brute force attacks. Attacker may alternatively conduct known plaintext attack or selected plaintexts attach schemes.
The different methods of attacks are as follows:

Man-in-the-Middle Attack
This technique is designed to intercept transmission of public key or insert known as key structure in place of requested public key. From victims’ perception, encrypted communication appears to be taking place normally, but actually attacker receives each encrypted message, decodes, encrypts, and sends it to originally intended recipient. Establishment of public keys with the digital signatures can prevent traditional man in the middle attack Correlation Attacks

Collection of brute force methods which attempt to deduce statistical relationships between structure of unknown key and ciphertext is called as correlation attacks. Differential and linear cryptanalysis has been used to mount successful attacks. Only defense organization is the selection of strong cryptosystems, by key management, and strict adherence to finest practices of cryptography in frequency of changing keys.

Dictionary Attacks
In the dictionary attack, attacker encrypts every word in a dictionary by using same cryptosystem used by target. Dictionary attacks can become successful if ciphertext consists of relatively few characters (for instance usernames, passwords).

Timing Attacks
Attacker eavesdrops through victim’s session is sometimes called timing attacks which uses statistical analysis of user’s typing patterns and inter keystroke timings to discern sensitive session information.

It is used to gain information about encryption key and possibly cryptosystem in use. Once encryption is broken successfully, attacker may launch a replay attack (an attempt to resubmit recording of deciphered authentication for entry into secure source).

Defending From Attacks
Does not matter how sophisticated encryption and cryptosystems have become, if key is revealed, message can be determined easily. Key management is not so much management of technology but instead management of people.


Related Discussions:- Attacks on cryptosystems-cryptography

Understanding a business model of a spammer, The first and foremost need of...

The first and foremost need of  any business is a role to perform for its client base, and for the spammer this will typically be the role of advertising products which, due to the

Computer security, Implementing an effective online authentication scheme i...

Implementing an effective online authentication scheme in practice faces many challenges. Systems with highly sensitive data often require multifactor authentication. But, requirin

What standards are to be applied, Government funding has been given to a un...

Government funding has been given to a university consortium establishing a repository of resources for school teachers. They have engaged you to develop a search facility for teac

Threads and attacks-information security, THREADS AND ATTACKS Threat is ...

THREADS AND ATTACKS Threat is an object, person, or other entity which represents a constant danger to an asset. To make sound decisions about information security, management s

Describe the functionality of a router, QUESTION: (a) Explain, with the...

QUESTION: (a) Explain, with the aid of a diagram, a Star topology of a network of your choice. (b) Illustrate on the use of a MAN and give an example of one. (c) Describe

Distinguish between passive and active attacks, Problem (a) Distinguis...

Problem (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Describe how

Explain the dimension of service quality, Problem 1: Discuss how TWO of...

Problem 1: Discuss how TWO of the following gurus have contributed to the Quality Movement, highlighting the major points of their philosophies: (a) Edward Deming (b) Jose

The effect the incident has on your business, QUESTION There are gener...

QUESTION There are generally five factors that will influence how you respond to computer security incidents- The effect the incident has on your business Legal issue

Briefly explain the following security goals, (a) Briefly explain the fo...

(a) Briefly explain the following security goals provided by cryptography: confidentiality, authentication, integrity and non-repudiation. (b) State Kerckhoff's Princip

Determine the codeword which is transmitted using crc, Question (a) For...

Question (a) For the bit stream 010011, show the waveforms for each of the code indicated. Consider that the signal level for NRZ-L for mark is positive; the signal level for t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd