0% found this document useful (0 votes)
12 views2 pages

Eccouncil Ceh31250 v12!20!5 1 Cryptanalysis

Uploaded by

NDAYIZEYE Janson
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views2 pages

Eccouncil Ceh31250 v12!20!5 1 Cryptanalysis

Uploaded by

NDAYIZEYE Janson
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Filename: eccouncil-ceh31250-v12-20-5-1-cryptanalysis.

md
Show Name: CEHv12 (312-50)
Topic Name: Cryptography - Cryptography
Episode Name: Cryptanalysis
================================================================================

Cryptanalysis

Objectives:

What is Cryptanalysis?

Studying cryptosystems
Looking for exploitable weaknesses

Methods

Linear

aka Known-Plaintext Attack

Requires both encrypted and plain-text data

Some plain-text could be guessed

Common words, names, and/or phrases

Goal is to reverse-engineer a decryption key

Further messages that were encrypted using that key could then be
easily decrypted

Differential

Attacker defines the plaintext inputs and analyzes the results

Continues this process until the key is determined

Chosen-Plaintext Attack

http://www.theamazingking.com/crypto-diff.php

Integral

Type of Differential attack


Uses larger inputs
Applicable to block ciphers

Code Breaking

Brute-Force
Frequency Analysis

Attacks

Man-in-the-Middle
Meet-in-the-Middle

Reduces the time it takes to break encryption on ciphers that use multiple
keys

Double-DES is vulnerable
Known-plaintext attack

PT --> E<k2> --> E<k2> --> CT

Apply known-plaintext attack from both sides to 'meet in the middle'

PT --> E(k1) = X
CT --> E(k2) = X

If X is the same for both then you've found the keys

Side-Channel Attacks
Physical attack

Monitors environmental aspects of the target to reveal sensitive info

Power Usage
Electromagnetic Radiation
Light Emanation
Audio Emanation

Hash Collisions

https://crackstation.net

Related Key

WEP

Rubber Hose Attack

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy